CompTIA Cloud+: Vulnerability Management and Compliance
CompTIA Cloud+
| Intermediate
- 15 videos | 1h 39m 53s
- Earns a Badge
Computing environments are subject to vulnerabilities that administrators must constantly monitor and manage. Compromised data can cause organizations to violate the rules of regulatory bodies and expose them to liability. In this course, learn about vulnerability management and compliance, beginning with cloud vulnerability management, vulnerability scanning scope, vulnerability identification, vulnerability assessment, and vulnerability remediation. Next, explore Common Vulnerabilities and Exposures (CVEs), cloud compliance considerations, data sovereignty, and data ownership. Finally, examine data locality, data classification, data retention, and compliance industry standards and best practices. This course is one of a collection that prepares learners for the CV0-004: CompTIA Cloud+ certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline vulnerability management in the cloud, including common types of scanning and the challenges of vulnerability managementDescribe scanning scope for vulnerability scanning in the cloudIdentify key considerations for identifying vulnerabilities in cloud services, assets, and applicationsRecognize how vulnerability assessments can be used for securing cloud resourcesProvide an overview of methods for remediating vulnerabilitiesDescribe key characteristics and practices for identifying and remedying common vulnerabilities and exposures (cves) in cloud computingOutline compliance as it relates to the cloud
-
Recognize the concept of data sovereignty and its role in cloud complianceDescribe the concept of data ownership and how it influences cloud complianceOutline the importance of data localization and its role in cloud complianceIdentify the importance of data classification and its role in maintaining complianceRecognize the practices and considerations for retaining data in the cloudDescribe common industry standards and best practices for maintaining cloud complianceSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 10sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 55sAfter completing this video, you will be able to outline vulnerability management in the cloud, including common types of scanning and the challenges of vulnerability management. FREE ACCESS
-
5m 35sUpon completion of this video, you will be able to describe scanning scope for vulnerability scanning in the cloud. FREE ACCESS
-
6m 49sIn this video, we will identify key considerations for identifying vulnerabilities in cloud services, assets, and applications. FREE ACCESS
-
5m 59sThrough this video, you will be able to recognize how vulnerability assessments can be used for securing cloud resources. FREE ACCESS
-
6m 48sAfter completing this video, you will be able to provide an overview of methods for remediating vulnerabilities. FREE ACCESS
-
6m 56sIn this video, we will describe key characteristics and practices for identifying and remedying Common Vulnerabilities and Exposures (CVEs) in cloud computing. FREE ACCESS
-
9m 42sUpon completion of this video, you will be able to outline compliance as it relates to the cloud. FREE ACCESS
-
6m 6sThrough this video, you will be able to recognize the concept of data sovereignty and its role in cloud compliance. FREE ACCESS
-
8m 32sAfter completing this video, you will be able to describe the concept of data ownership and how it influences cloud compliance. FREE ACCESS
-
7m 15sIn this video, we will outline the importance of data localization and its role in cloud compliance. FREE ACCESS
-
9m 41sUpon completion of this video, you will be able to identify the importance of data classification and its role in maintaining compliance. FREE ACCESS
-
9m 55sThrough this video, you will be able to recognize the practices and considerations for retaining data in the cloud. FREE ACCESS
-
7m 36sAfter completing this video, you will be able to describe common industry standards and best practices for maintaining cloud compliance. FREE ACCESS
-
53sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.