5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Network Security Specialist to CloudOps Security Architect     CloudOps Security Architect Track 1: Network Security Specialist

In this 14-video course, learners will discover principles and concepts used to ensure secure cloud computing. Topics include disaster recovery, cloud security concepts, and retention. Begin by examining the requirements for business continuity strategy; recognize requirements for disaster recovery strategy, and recognize considerations when moving applications to the cloud. Learn how to differentiate between data ownership and data custody, and explore key legal considerations when moving to the cloud. Next, learn about the importance of performing a cost-benefit analysis, and then recognize the factors that can impact confidentiality, integrity, data integrity, and availability of cloud data. This leads into cloud offering services, and a look at benefits of cloud offerings such as Amazon Web Services (AWS) and Azure. Recognize functional security requirements such as portability, interoperability, and vendor lock-in. Design and plan security controls including on-premises physical controls, virtualization protection, and authorization. The final two tutorials examine the importance of retention policies and archiving procedures, and the considerations relating to traceability and accountability such as logging, event sources, and chain of custody.



Objectives

Business Continuity: Secure Cloud Computing

  • discover the key concepts covered in this course
  • list requirements for business continuity strategy
  • recognize requirements for disaster recovery strategy
  • recognize considerations when moving applications to the cloud
  • differentiate between data ownership and data custody
  • describe key legal considerations when moving to the cloud
  • list the importance of performing a cost-benefit analysis
  • recognize factors that can impact confidentiality, integrity, and availability of cloud data
  • describe the benefits of cloud offerings such as AWS and Azure
  • list functional security requirements such as portability, interoperability, and vendor lock-in
  • design and plan security controls including on-premise physical controls, virtualization protection, and authorization
  • describe the importance of retention policies and archiving procedures
  • list considerations that relate to traceability and accountability such as logging, event sources, and chain of custody
  • summarize the key concepts covered in this course