CompTIA Cloud Essentials+: Cloud Governance & Securing Data
Ensure data security and confidentiality in cloud computing through policy-based access control, data sovereignty, vulnerability assessment, and data availability.
About this course
Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality. In this course, you’ll investigate the cloud computing policy, which protects sensitive personal and confidential business data. You’ll examine standard operating features, resource management, and security implementation checklist items and best practices for cloud computing. You’ll then practice implementing policy-based access control for cloud computing. Moving on, you’ll outline how to implement data sovereignty. You’ll explore the international cloud computing standards, integrated vulnerability assessment solutions, and data security and privacy implementation in cloud computing. Finally, you’ll outline how to implement and secure data and ensure availability in the cloud. You’ll study the layers of security that can be implemented in the cloud, the cloud identity logs that help track events impacting cloud environments, and the OWASP Top 10 data-level authorization methods used to secure resources.
Learning objectives
Discover the key concepts covered in this course
Describe the cloud computing policy and guidelines that applies to all personal data, sensitive personal data, and confidential business data and information
Describe the standard cloud computing operating features from the perspective of business support, provisioning and configuration, and portability and interoperability requirements
Show all
There are no reviews yet.