5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Network Security Specialist to CloudOps Security Architect     CloudOps Security Architect Track 1: Network Security Specialist

There are many factors to consider when integrating with a cloud computing environment. In this 14-video course, you will explore cloud data storage types, cloud security concepts, how to evaluate cloud service providers, and cloud infrastructure components. To begin, you will explore the six key stages in the cloud secure data lifecycle: create, store, use, share, archive, and destroy. Learn to recognize key access control considerations, and list network security concepts such as data and media sanitization. Next, you will examine virtualization security concepts such as hypervisor and container security. View the common threats against cloud computing infrastructure, and describe the considerations when evaluating cloud service providers. Learners then move on to the physical environment, and common cloud infrastructure components such as storage, network, virtualization, and compute. Learn to recognize how to analyze cloud risks, and list data security strategies such as encryption and key management. Also, you will explore data discovery techniques; data rights management, and finally, information rights management.



Objectives

Business Continuity: Cloud Integration

  • discover the key concepts covered in this course
  • describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
  • recognize key access control considerations
  • list network security concepts such data and media sanitization
  • list virtualization security concepts such as hypervisor and container security
  • list potential threats against cloud computing infrastructure
  • describe considerations when evaluating cloud service providers
  • list common cloud infrastructure components such as network, virtualization, and computer
  • recognize how to analyze cloud risks
  • list data security strategies such as encryption and key management
  • list data discovery techniques
  • describe data rights management
  • describe information rights management
  • summarize the key concepts covered in this course