Introduction to Information Security within Cloud Computing
Offered By: Pluralsight
Course Description
Overview
Selecting secure cloud services begins with understanding business requirements. This course will teach you to identify and select secure cloud services based upon business requirements.
With an expanding array of cloud services being offered daily it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, Introduction to Information Security within Cloud Computing, you’ll learn to identify and select secure cloud services based upon business requirements. First, you’ll explore the detailed definition of cloud computing. Next, you’ll discover the deployment and service models of cloud computing. Finally, you’ll learn how to use a matrix to review the controls enacted by a cloud provider. When you’re finished with this course, you’ll have the skills and knowledge of, Introduction to Information Security within Cloud Computing needed to select secure cloud services that meet business requirements.
With an expanding array of cloud services being offered daily it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, Introduction to Information Security within Cloud Computing, you’ll learn to identify and select secure cloud services based upon business requirements. First, you’ll explore the detailed definition of cloud computing. Next, you’ll discover the deployment and service models of cloud computing. Finally, you’ll learn how to use a matrix to review the controls enacted by a cloud provider. When you’re finished with this course, you’ll have the skills and knowledge of, Introduction to Information Security within Cloud Computing needed to select secure cloud services that meet business requirements.
Taught by
Lyron Andrews
Related Courses
Information Security and Risk Management in ContextUniversity of Washington via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Intro to Information Security
Georgia Institute of Technology via Udacity Information Security and Risk Management: An Overview
University of Washington via Canvas Network Information Security- II
Indian Institute of Technology Madras via Swayam