Cloud Security: Introduction to Certified Cloud Security Professional (CCSP®)
Offered By: Pluralsight
Course Description
Overview
Learn how to select a cloud service provider based upon specific business requirements and how to consume services securely.
Many organizations may make the mistake of skipping architecture and going straight to design. This can be avoided by selecting a cloud service provider that fits with your business requirements. In this course, Cloud Security: Introduction to Certified Cloud Security Professional (CCSP), you will learn foundational knowledge of how to translate business requirements into selection criteria for a cloud service provider. First, you will learn how to identify which cloud architecture best meets your business requirements. Next, you will discover how to use security architecture to develop a secure cloud consumption strategy. Finally, you will explore how to select a cloud service provider and meet regulatory requirements. When you’re finished with this course, you will have the skills and knowledge needed to select and consume cloud services securely.
Many organizations may make the mistake of skipping architecture and going straight to design. This can be avoided by selecting a cloud service provider that fits with your business requirements. In this course, Cloud Security: Introduction to Certified Cloud Security Professional (CCSP), you will learn foundational knowledge of how to translate business requirements into selection criteria for a cloud service provider. First, you will learn how to identify which cloud architecture best meets your business requirements. Next, you will discover how to use security architecture to develop a secure cloud consumption strategy. Finally, you will explore how to select a cloud service provider and meet regulatory requirements. When you’re finished with this course, you will have the skills and knowledge needed to select and consume cloud services securely.
Taught by
Lyron Andrews
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network