Leadership Development
Technology & Data Science
Project Management
Organizational Effectiveness
Essential Business Functions
Innovation & Entrepreneurship
Personal Development
Teaching & Learning
Events & Community
Cloud Operations Security
Course Description
This course begins by covering security issues with regard to operating cloud services. While it covers many aspects relevant to a cloud service provider, it should be particularly valuable to helping cloud consumers understand how security responsibilities may be divided between consumer and provider. The second module engages the learner with real-world scenarios that represent the challenges to securing cloud operations. This course is designed for IT professionals and other adult learners who have some knowledge of internet-related technology. This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.
Learning Outcomes
After completing this course, the learner should be able to:
- Identify the considerations choosing data center site
- Explain ways to implement physical security
- Describe the various considerations for securing hardware and networking resources
- Understand the vulnerabilities and mitigation strategies for securing the management plane of a cloud facility
- Describe the steps involved in creating a business continuity plan for a data center
- Explain the role and requirements of forensics in a cloud facility
- Apply what you have learned to real-world scenarios involving cybersecurity and cloud computing