CompTIA Cloud+: Data Security & Compliance Controls
CompTIA
| Intermediate
- 12 videos | 1h 17m 3s
- Includes Assessment
- Earns a Badge
There may be several ramifications for failing to secure your organization's data in the cloud environment. This could also mean failing to comply with regulatory compliances. In this course, you will learn how mandatory access controls are used to secure cloud services. First, you will learn encryption, hashing algorithms, digital signatures, the access security broker and file integrity monitoring can be used to ensure data security and regulatory compliance. Next, you will learn how data classification, network and access control can be used to secure data. Next, you will learn about data security laws and regulations and the legal requirements for securely storing data. Finally, you will learn about data loss prevention and the components of records management systems including versioning, retention, destruction and write once/read many. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how mandatory access controls are used to secure cloud servicesDescribe how encryption can be used for data security and complianceDescribe how data integrity can be achieved using hashing algorithms, digital signatures and file integrity monitoringDescribe how data classification can be used to secure dataDescribe how network segmentation can be used to secure data
-
Describe how access control can be used to secure dataDescribe the impact of laws and regulations and the legal requirements for securely storing dataDescribe the components of records management including versioning, retention, destruction and write once/read manyDescribe data loss prevention (dlp) and why is important for data security and regulatory complianceDescribe the clouds access security broker (casb) and how it can be used for data security and complianceSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49sIn this video, you’ll learn more about your instructor and the course. Here, you’ll learn how mandatory access controls are used to secure cloud services and examine encryption, hashing algorithms, digital signatures and how file integrity monitoring can be used to ensure data security. Next, you’ll discover data classification, segmentation, and access control followed by data security laws and regulatory compliance. Finally, you’ll explore data loss prevention policies and the components of records management systems. FREE ACCESS
-
8m 22sIn this video, you’ll learn more about mandatory access control and how it can be used to secure cloud services. You’ll learn this refers to two levels of access control, physical and logical. Physical generally refers to on-premise environments. For cloud-based customers, the primary concern is logical access, which refers to data, policies, configuration settings, or anything else that is represented in digital form. FREE ACCESS
-
6m 39sIn this video, you’ll learn more about how encryption can be implemented in a cloud environment to enhance data security and meet compliance requirements. The first thing to consider is how the data finds its way into the cloud service. Is it generated when your services go live or is it a migration of existing on-premises data? If it’s migration, many cloud providers offer services to encrypt the data before transmission to the cloud. FREE ACCESS
-
9m 37sIn this video, you’ll learn more about methods to protect the integrity of your data in the cloud. This includes hashing, digital signatures, and file integrity monitoring. You’ll learn hashing is a service that takes any kind of value as an input and converts the input into byte values. Next, you’ll learn digital signatures provide authentication of identities and they encrypt the data. Finally, you’ll learn file integrity monitoring ensures compliance rules are observed. FREE ACCESS
-
5m 53sIn this video, you’ll learn more about implementing Data Classification in a cloud environment, which can then be used to determine the kind of access an entity has to that data. Classification deals with the level of secrecy required for information. You’ll learn the classifications you use in your organization are entirely arbitrary. And along with classification comes a security clearance level that equates to each classification. FREE ACCESS
-
6m 38sIn this video, you’ll learn more about segmentation, or the process of separating different parts of your environment from each other by taking a larger single unit and breaking it down into smaller units. You’ll learn the most commonly implemented method is Network Segmentation, which subdivides any existing network into smaller units. This can then facilitate other methods such as Data Segmentation, User Segmentation, Processor, Application Segmentation, Protocol Segmentation, and others. FREE ACCESS
-
7m 29sIn this video, you’ll learn more about implementing access control for data in the cloud, the primary method of protecting data. You’ll learn this determines which users are able to gain access to data. It also addresses questions like how your access methods are enforced, and how best to know which users have access versus which don't, and under which circumstances access should be denied. Managing access is a critical aspect of any cloud-based solution. FREE ACCESS
-
9m 38sIn this video, you’ll learn more about maintaining compliance with respect to data stored in the cloud. There are some common regulations that dictate measures needed to ensure your operations are compliant. You’ll learn to assure customers or the general public their data is safe, you must be consistent when it comes to data stored in the same place using the same technologies and security controls. You should also provide visibility with respect to location. FREE ACCESS
-
9m 4sIn this video, you’ll learn more about data records management in the cloud. You’ll learn this includes four basic components. These include Retention, which determines how long information’s kept. It also includes Versioning, which provides a mechanism to maintain historical versions of data as changes occur. And Write Once Read Many, which says data classified as such must remain in an unchanged state. Finally, you’ll learn Destruction which defines processes to address levels of recoverability. FREE ACCESS
-
7m 8sIn this video, you’ll learn more about Data Loss Prevention in the cloud. You’ll learn this refers to the protection of data in terms of ensuring it does not leave the confines of your organization in an unauthorized manner. DLP policies implement Encryption to protect data at rest and in transit. It also defines activities that can or cannot be performed against that data. FREE ACCESS
-
3m 55sIn this video, you’ll learn more about the Cloud Access Security Broker, which is an application typically implemented between your on-site environment and your cloud infrastructure. You’ll learn it facilitates the extension of your existing on-premises security policies into your cloud subscription. This is useful for organizations who are migrating toward cloud services as opposed to starting fresh or are looking for a hybrid configuration. FREE ACCESS
-
51sIn this video, you’ll summarize what you’ve learned in the course. You’ve learned regulatory compliance and data security laws and regulations. You explored securing cloud services with mandatory access control, using data security encryption, integrity, and classification to secure data, securing data through segmentation and access control, the legal requirements for securely storing data, and components of data records management. You also learned why data loss prevention is important for security and regulatory compliance. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.