Description
Course info
Rating
(20)
Level
Intermediate
Updated
Sep 29, 2017
Duration
2h 8m
Description

Organizations everywhere are trying to leverage cloud computing to achieve business or mission goals. Many believe it's just marketing hype while other's see it as a wholesale change in how information technology is delivered. In this course, Cloud Computing and the Security Challenge, you'll learn about cloud computing and the security challenge of it all. First, you'll explore a short history of cloud computing. Next, you'll discover the basic cloud computing concepts and introduces you to the key cloud computing transition security challenges. Finally, you'll learn how to be able to describe the value this new model delivers and explain how to effectively address some of the most important cloud cyber security concerns. After finishing this course, you'll understand why cloud computing isn't just marketing hype.

About the author
About the author

Kevin L. Jackson is a globally recognized cloud computing thought leader and an (ISC)2 Certified Cloud Security Professional instructor.

More from the author
Designing the Physical Cloud
Advanced
1h 53m
Feb 15, 2019
Providing Secure Cloud Applications
Intermediate
2h 16m
Oct 11, 2018
Managing Data in the Cloud
Intermediate
2h 45m
May 18, 2018
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Kevin L. Jackson, and welcome to Cloud Computing and the Security Challenges. I was part of the Certified Cloud Security Professional Certification Development Team and currently serve as Director Cloud Computing Solutions at Engility, a two billion dollar technology services firm. Companies everywhere want to leverage cloud computing to achieve their organizational goals. Many believe it's just marketing hype, while others see it as an information technology upheaval. After providing an historical foundation, this course will teach you basic cloud computing concepts and introduce you to key cloud transition security challenges. Upon completion you will understand why cloud computing isn't just hype. You will also be able to describe the value of this new model and explain how to effectively address some of the most important cybersecurity concerns. Major topics covered include the cloud computing definition, cloud deployment and service models, why you should and shouldn't use cloud computing, and how to address some of the major cybersecurity concerns. By the end of this course you'll be able to explain cloud computing with the competence of a pro. There are no prerequisites other than the desire to really understand what cloud computing is all about. Please join me on this journey with the Cloud Computing and Security Challenges course at Pluralsight.