Introduction to Information Security within Cloud Computing
Course info



Course info



Description
With an expanding array of cloud services being offered daily it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, Introduction to Information Security within Cloud Computing, you’ll learn to identify and select secure cloud services based upon business requirements. First, you’ll explore the detailed definition of cloud computing. Next, you’ll discover the deployment and service models of cloud computing. Finally, you’ll learn how to use a matrix to review the controls enacted by a cloud provider. When you’re finished with this course, you’ll have the skills and knowledge of, Introduction to Information Security within Cloud Computing needed to select secure cloud services that meet business requirements.
Section Introduction Transcripts
Course Overview
Hi, everyone. My name is Lyron, and welcome to my course, Introduction to Information Security within Cloud Computing. I am an international cloud security consultant, author, and trainer at Profabula. The growth of technology, tools, and services in the cloud is exponential, and you can see evidences of this in your cloud management console daily. With an expanding array of cloud services and technology offerings, it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, we are going to identify and select secure cloud services based upon business requirements. Some of the major topics that we will cover include getting familiar with and using a common taxonomy to describe cloud computing, how to use those definitions to address business requirements through the selection of appropriate deployment in service models, and the use of a tool called the Cloud Control Matrix that will allow you to map common cloud security controls with regulatory and legal frameworks. By the end of this course, you will have the knowledge in order to select a secure cloud service that meets business requirements. I hope you'll join me on this journey to learn how to identify and select secure cloud services with the Introduction to Information Security within Cloud Computing course, at Pluralsight.