Configuring Cloud Security
Intermediate
- 6 videos | 26m 7s
- Includes Assessment
- Earns a Badge
Systems and applications running in the cloud are subject to malicious attacks. Explore best practices for cloud security, including operation and service models, virtualization, legal and privacy concerns, data storage, and outsourcing.
WHAT YOU WILL LEARN
-
Distinguish between cloud security operation modelsDistinguish between cloud security service modelsDescribe characteristics of cloud virtualization
-
Identify the legal and privacy concerns associated with cloud securityIdentify secure data storage and transmission options for cloud securityIdentify security requirements when outsourcing cloud services
IN THIS COURSE
-
5m 1s
-
3m 39s
-
2m 36s
-
5m 12s
-
3m 32s
-
6m 9s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.