Internet And Network Technologies
Cloud Security Management
Cloud Security Management: Architecture Security
Cloud Security Management: Data Security
Cloud Security Management: Legal & Compliance
Cloud Security Management: Operations Security
Cloud Security Management: Platform & Infrastructure Security
Cloud Security Management: Risk Management

Cloud Security Management: Architecture Security

Course Number:
it_socdsmdj_01_enus
Lesson Objectives

Cloud Security Management: Architecture Security

  • discover the key concepts covered in this course
  • recall the steps to plan cloud security management
  • recognize cloud computing definitions
  • classify various cloud deployment models
  • describe the different cloud transition scenarios and functions
  • recognize how to secure the perimeter using key technologies
  • define IAM and identify the importance of access control
  • identify common threats in cloud
  • match different models with security considerations
  • describe the security data life cycle
  • define business continuity and DR planning including high availability and disaster recovery
  • summarize the key concepts covered in this course

Overview/Description

Cloud objects are very dynamic, so it is important to be familiar with current cloud core design, as well as cloud security and integrity. In this course, you'll learn about cloud security management. You'll examine key terms and cloud roles that can be adopted to meet client requirements. In addition, you'll explore cloud transition scenarios, how to secure the cloud perimeter, the importance of access control, common cloud threats, and cloud model security considerations. Lastly, you'll learn about the secure data life cycle, business continuity, and disaster recovery planning.



Target

Prerequisites: none

Cloud Security Management: Data Security

Course Number:
it_socdsmdj_03_enus
Lesson Objectives

Cloud Security Management: Data Security

  • discover the key concepts covered in this course
  • describe the fundamentals of data security
  • recognize the dynamics of data and data controls
  • recognize technologies used in secure data management
  • recognize how data is classified and mechanisms for managing data classification
  • recognize the importance of privacy and various data privacy acts
  • recognize DRM and its importance in corporate scenarios
  • use AWS key management services
  • recognize the importance of events and their relationship with data
  • summarize the key concepts covered in this course

Overview/Description

Data is the key to information on different components within an organization, so it's vital to understand and manage data and security events. With the dynamic nature of the cloud, it's also essential to understand how to track and secure data. In this course, you'll learn about the different types of data and how to securely manage it. In addition, you'll examine different types of compliance, privacy rights, and protection policies.



Target

Prerequisites: none

Cloud Security Management: Legal & Compliance

Course Number:
it_socdsmdj_06_enus
Lesson Objectives

Cloud Security Management: Legal & Compliance

  • discover the key concepts covered in this course
  • define the ISO/IEC 27017:2015 security techniques and code of practice
  • specify how e-Discovery provides legal controls to cloud service providers
  • list different types of audits and impact of requirement programs
  • describe the ISO/IEC 27018 standard
  • identify the impact of clear communication and governance on process and activities
  • describe the implications of risk profile and the difference between data owner and controller, keeping in mind the cloud paradigm
  • identify common criteria assurance frameworks, CSA STAR, and contract management
  • summarize the key concepts covered in this course

Overview/Description

It is important to understand the different cloud compliance procedures that should be followed by service providers and data owners. It's also vital to be familiar with the various cloud-specific legal compliance guidelines. In this course, you'll learn about international legislation conflicts, cloud-specific risks, legal controls, e-Discovery processes, and requirements for forensic analysis.



Target

Prerequisites: none

Cloud Security Management: Operations Security

Course Number:
it_socdsmdj_02_enus
Lesson Objectives

Cloud Security Management: Operations Security

  • discover the key concepts covered in this course
  • describe the importance of design in security operations
  • list enterprise operation best practices
  • configure security networks in the workplace
  • describe how dynamic operations in the cloud work
  • identify the importance of patch management operations
  • define performance monitoring
  • define operations management
  • specify how business continuity management is planned
  • describe how digital evidence operations function
  • identify how to communicate with stakeholders
  • summarize the key concepts covered in this course

Overview/Description

Operations is one of the most crucial steps in the administration process. Handled properly, they ensure loop holes get closed and provide evidence details that can be used in issue tracking. In this course, you'll learn about different types of operations, how to execute them, and why they are important in the dynamic nature of the cloud. You'll also learn about communicating with stakeholders, digital evidence, and business continuity planning.



Target

Prerequisites: none

Cloud Security Management: Platform & Infrastructure Security

Course Number:
it_socdsmdj_05_enus
Lesson Objectives

Cloud Security Management: Platform & Infrastructure Security

  • discover the key concepts covered in this course
  • describe network functionality and technologies
  • list the key regulations used to protect datacenter facilities
  • define identification, authentication, and authorization for resources
  • recognize the different types of storage in AWS
  • describe countermeasure strategies including uptime automation of controls and access controls
  • define configuration and data life cycle automation
  • summarize the key concepts covered in this course

Overview/Description

The physical site of the data center, along with the physical and virtual assets, play a very important role in cloud security. Network assets, storage, and the software layout of virtualization are important tools in bringing cloud up as a service. In this course, you'll learn about the physical cloud assets and the basic concepts of regions and availability zones. You'll also learn why it's important to secure them and protect them from various external attacks and processes.



Target

Prerequisites: none

Cloud Security Management: Risk Management

Course Number:
it_socdsmdj_04_enus
Lesson Objectives

Cloud Security Management: Risk Management

  • discover the key concepts covered in this course
  • identify potential cloud risks
  • describe risk from the perspective of the physical site and environment
  • list the risks involved in software-defined datacenters
  • describe risk audit mechanisms
  • describe business continuity and disaster recovery
  • identify the potential risks undertaken in BCDR
  • create a BCDR plan
  • summarize the key concepts covered in this course

Overview/Description

Every organization needs to understand risk and be familiar with how to mitigate it. Cloud services have different stakeholders and projects, and for this reason having a good understanding of risk is important. In this course, you'll learn about different types of risk and how to properly manage them. In addition, you'll explore risk auditing, business continuity, and disaster recovery.



Target

Prerequisites: none

Close Chat Live