CompTIA Cloud+: Vulnerability Management and Compliance

CompTIA Cloud+    |    Intermediate
  • 15 videos | 1h 39m 53s
  • Earns a Badge
Computing environments are subject to vulnerabilities that administrators must constantly monitor and manage. Compromised data can cause organizations to violate the rules of regulatory bodies and expose them to liability. In this course, learn about vulnerability management and compliance, beginning with cloud vulnerability management, vulnerability scanning scope, vulnerability identification, vulnerability assessment, and vulnerability remediation. Next, explore Common Vulnerabilities and Exposures (CVEs), cloud compliance considerations, data sovereignty, and data ownership. Finally, examine data locality, data classification, data retention, and compliance industry standards and best practices. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline vulnerability management in the cloud, including common types of scanning and the challenges of vulnerability management
    Describe scanning scope for vulnerability scanning in the cloud
    Identify key considerations for identifying vulnerabilities in cloud services, assets, and applications
    Recognize how vulnerability assessments can be used for securing cloud resources
    Provide an overview of methods for remediating vulnerabilities
    Describe key characteristics and practices for identifying and remedying common vulnerabilities and exposures (cves) in cloud computing
    Outline compliance as it relates to the cloud
  • Recognize the concept of data sovereignty and its role in cloud compliance
    Describe the concept of data ownership and how it influences cloud compliance
    Outline the importance of data localization and its role in cloud compliance
    Identify the importance of data classification and its role in maintaining compliance
    Recognize the practices and considerations for retaining data in the cloud
    Describe common industry standards and best practices for maintaining cloud compliance
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 10s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 55s
    After completing this video, you will be able to outline vulnerability management in the cloud, including common types of scanning and the challenges of vulnerability management. FREE ACCESS
  • Locked
    3.  Vulnerability Scanning Scope
    5m 35s
    Upon completion of this video, you will be able to describe scanning scope for vulnerability scanning in the cloud. FREE ACCESS
  • Locked
    4.  Vulnerability Identification
    6m 49s
    In this video, we will identify key considerations for identifying vulnerabilities in cloud services, assets, and applications. FREE ACCESS
  • Locked
    5.  Vulnerability Assessment
    5m 59s
    Through this video, you will be able to recognize how vulnerability assessments can be used for securing cloud resources. FREE ACCESS
  • Locked
    6.  Vulnerability Remediation
    6m 48s
    After completing this video, you will be able to provide an overview of methods for remediating vulnerabilities. FREE ACCESS
  • Locked
    7.  Common Vulnerabilities and Exposures (CVEs)
    6m 56s
    In this video, we will describe key characteristics and practices for identifying and remedying Common Vulnerabilities and Exposures (CVEs) in cloud computing. FREE ACCESS
  • Locked
    8.  Cloud Compliance
    9m 42s
    Upon completion of this video, you will be able to outline compliance as it relates to the cloud. FREE ACCESS
  • Locked
    9.  Data Sovereignty
    6m 6s
    Through this video, you will be able to recognize the concept of data sovereignty and its role in cloud compliance. FREE ACCESS
  • Locked
    10.  Data Ownership
    8m 32s
    After completing this video, you will be able to describe the concept of data ownership and how it influences cloud compliance. FREE ACCESS
  • Locked
    11.  Data Locality
    7m 15s
    In this video, we will outline the importance of data localization and its role in cloud compliance. FREE ACCESS
  • Locked
    12.  Data Classification
    9m 41s
    Upon completion of this video, you will be able to identify the importance of data classification and its role in maintaining compliance. FREE ACCESS
  • Locked
    13.  Data Retention
    9m 55s
    Through this video, you will be able to recognize the practices and considerations for retaining data in the cloud. FREE ACCESS
  • Locked
    14.  Compliance Industry Standards and Best Practices
    7m 36s
    After completing this video, you will be able to describe common industry standards and best practices for maintaining cloud compliance. FREE ACCESS
  • Locked
    15.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 50 users Rating 4.5 of 50 users (50)
Rating 4.7 of 41 users Rating 4.7 of 41 users (41)