Internet And Network Technologies
Business Continuity Management
Business Continuity: Cloud Integration
Business Continuity: Secure Cloud Computing

Business Continuity: Cloud Integration

Course Number:
it_csbcmgdj_01_enus
Lesson Objectives

Business Continuity: Cloud Integration

  • discover the key concepts covered in this course
  • describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
  • recognize key access control considerations
  • list network security concepts such data and media sanitization
  • list virtualization security concepts such as hypervisor and container security
  • list potential threats against cloud computing infrastructure
  • describe considerations when evaluating cloud service providers
  • list common cloud infrastructure components such as network, virtualization, and computer
  • recognize how to analyze cloud risks
  • list data security strategies such as encryption and key management
  • list data discovery techniques
  • describe data rights management
  • describe information rights management
  • summarize the key concepts covered in this course

Overview/Description

There are many factors to consider when integrating with a cloud computing environment. Explore cloud data storage architectures, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components.



Target

Prerequisites: none

Business Continuity: Secure Cloud Computing

Course Number:
it_csbcmgdj_02_enus
Lesson Objectives

Business Continuity: Secure Cloud Computing

  • discover the key concepts covered in this course
  • list requirements for business continuity strategy
  • recognize requirements for disaster recovery strategy
  • recognize considerations when moving applications to the cloud
  • differentiate between data ownership and data custody
  • describe key legal considerations when moving to the cloud
  • list the importance of performing a cost-benefit analysis
  • recognize factors that can impact confidentiality, integrity, and availability of cloud data
  • describe the benefits of cloud offerings such as AWS and Azure
  • list functional security requirements such as portability, interoperability, and vendor lock-in
  • design and plan security controls including on-premise physical controls, virtualization protection, and authorization
  • describe the importance of retention policies and archiving procedures
  • list considerations that relate to traceability and accountability such as logging, event sources, and chain of custody
  • summarize the key concepts covered in this course

Overview/Description

Discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention.



Target

Prerequisites: none

Close Chat Live