Cloud Security, Risk, and Compliance: Managing Security in the Cloud Era
Cloud
| Intermediate
- 16 videos | 1h 37m 31s
- Includes Assessment
- Earns a Badge
Cloud security combines technologies, policies, controls, and services to help protect cloud infrastructure, resources, and data. In this course, you'll explore the history of IT security and learn how it evolved to include cloud technologies. Discover common security threats such as cloud misconfigurations, unauthorized access, limited cloud visibility, insider threats, malware infections, and account hijacking. Explore how built-in security controls can attempt to mitigate security attacks and review cloud security data breaches from recent years, including how they were discovered and mitigated and the cost associated with resolving them. Lastly, explore how enterprises can plan for various security scenarios and why leaders should make security a key feature of their products and services.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the history of it security and how it evolved to include cloud technologiesRecognize how cloud misconfigurations can result in cloud data breachesRecognize how unauthorized access can result in a cloud security breachRecognize how a lack of security strategy can result in a security threatRecognize how a lack of cloud usage visibility can impact cloud securityOutline account hijacking and how it can threaten cloud securityRecognize how to detect and prevent insider threats
-
Outline how distributed denial of service attacks (ddos) are on the rise and how they are used to interrupt cloud servicesOutline how insecure interfaces and application programming interfaces (apis) can leave a system vulnerable to attacksIdentify the risks posed by malware infectionsRecognize how insufficient identity and access management (iam) policies can result in various threatsOutline how built-in security controls can attempt to mitigate security attacks compared to older solutionsOutline cloud security data breaches in recent years including how they were discovered and mitigated and the cost associated with eachRecognize how enterprises can plan for various security scenarios and how leaders should make security a key feature of their products and servicesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9s
-
9m 49s
-
6m 24s
-
6m 53s
-
5m 7s
-
7m 18s
-
8m 50s
-
9m 4s
-
4m 59s
-
6m 29s
-
6m 55s
-
7m 12s
-
6m 48s
-
5m 37s
-
4m 4s
-
55s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.