CompTIA Cloud Essentials+: Cloud Governance & Securing Data

placeholder

Cloud consumers look for cloud services that follow regulations and core principles for maintaining data security and confidentiality.

In this course you;ll investigate the cloud computing policy which protects sensitive personal and confidential business data. You;ll examine standard operating features resource management and security implementation checklist items and best practices for cloud computing. You;ll then practice implementing policy-based access control for cloud computing.

Moving on you;ll outline how to implement data sovereignty. You;ll explore the international cloud computing standards integrated vulnerability assessment solutions and data security and privacy implementation in cloud computing.

Finally you;ll outline how to implement and secure data and ensure availability in the cloud. You;ll study the layers of security that can be implemented in the cloud the cloud identity logs that help track events impacting cloud environments and the OWASP Top 10 data-level authorization methods used to secure resources.