5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Cloud Computing     CompTIA Cloud Essentials+ (CLO-002)
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality.
In this course, you'll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You'll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You'll then practice implementing policy-based access control for cloud computing.
Moving on, you'll outline how to implement data sovereignty. You'll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing.
Finally, you'll outline how to implement and secure data and ensure availability in the cloud. You'll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.

Objectives

CompTIA Cloud Essentials+ (CLO-002): Cloud Governance & Securing Data

  • discover the key concepts covered in this course
  • describe the cloud computing policy and guidelines that applies to all personal data, sensitive personal data, and confidential business data and information
  • describe the standard cloud computing operating features from the perspective of business support, provisioning and configuration, and portability and interoperability requirements
  • recognize the concept of resource management in cloud computing with a focus on classification and taxonomy and compare the prominent resource management algorithms
  • list the items in a cloud security checklist that ensure an enterprise is covering all its bases and outline best practices for implementing cloud security
  • describe the objective and methods of implementing policy-based access control in cloud computing
  • use AWS IAM to create roles and users and attach policies to manage authorization for AWS resources and services
  • identify the value of cloud compliance and specify how to implement a compliance program in the cloud
  • describe the concept of data sovereignty along with the steps involved in implementing a data protection strategy that supports the implementation of data sovereignty
  • recall the international standards for cloud computing and the behaviors that need to be coordinated across roles and implemented consistently in a cloud computing system
  • recognize the concept of an integrated vulnerability assessment solution along with the role of vulnerability scanners
  • list the essential elements required to implement data security and privacy in cloud computing
  • describe the concept of data confidentiality in cloud computing along with the recommended techniques to implement and secure data
  • describe the layers of security that can be implemented in the cloud along with the recommended approaches for doing so
  • recall the critical indicators of availability and outline the approach to implementing availability in the cloud
  • describe the cloud identity logs that help track events that may have a direct impact on cloud environments and also help implement cloud audits
  • recognize the data-level authorization outlined in OWASP Top 10 that can be used to secure resources
  • summarize the key concepts covered in this course