Internet And Network Technologies
Business Continuity Management
Business Continuity: Cloud Integration
it_csbcmgdj_01_enus
Business Continuity: Secure Cloud Computing
it_csbcmgdj_02_enus
Business Continuity: Cloud Integration
Lesson Objectives
Business Continuity: Cloud Integration
- discover the key concepts covered in this course
- describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
- recognize key access control considerations
- list network security concepts such data and media sanitization
- list virtualization security concepts such as hypervisor and container security
- list potential threats against cloud computing infrastructure
- describe considerations when evaluating cloud service providers
- list common cloud infrastructure components such as network, virtualization, and computer
- recognize how to analyze cloud risks
- list data security strategies such as encryption and key management
- list data discovery techniques
- describe data rights management
- describe information rights management
- summarize the key concepts covered in this course
Overview/Description
There are many factors to consider when integrating with a cloud computing environment. Explore cloud data storage architectures, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components.
Target
Prerequisites: none
Business Continuity: Secure Cloud Computing
Lesson Objectives
Business Continuity: Secure Cloud Computing
- discover the key concepts covered in this course
- list requirements for business continuity strategy
- recognize requirements for disaster recovery strategy
- recognize considerations when moving applications to the cloud
- differentiate between data ownership and data custody
- describe key legal considerations when moving to the cloud
- list the importance of performing a cost-benefit analysis
- recognize factors that can impact confidentiality, integrity, and availability of cloud data
- describe the benefits of cloud offerings such as AWS and Azure
- list functional security requirements such as portability, interoperability, and vendor lock-in
- design and plan security controls including on-premise physical controls, virtualization protection, and authorization
- describe the importance of retention policies and archiving procedures
- list considerations that relate to traceability and accountability such as logging, event sources, and chain of custody
- summarize the key concepts covered in this course
Overview/Description
Discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention.
Target
Prerequisites: none