Introduction to Information Security within Cloud Computing

Selecting secure cloud services begins with understanding business requirements. This course will teach you to identify and select secure cloud services based upon business requirements.
Course info
Level
Beginner
Updated
Jun 4, 2020
Duration
1h 20m
Table of contents
Description
Course info
Level
Beginner
Updated
Jun 4, 2020
Duration
1h 20m
Description

With an expanding array of cloud services being offered daily it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, Introduction to Information Security within Cloud Computing, you’ll learn to identify and select secure cloud services based upon business requirements. First, you’ll explore the detailed definition of cloud computing. Next, you’ll discover the deployment and service models of cloud computing. Finally, you’ll learn how to use a matrix to review the controls enacted by a cloud provider. When you’re finished with this course, you’ll have the skills and knowledge of, Introduction to Information Security within Cloud Computing needed to select secure cloud services that meet business requirements.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
Perform Cloud Security Operations
Intermediate
48m
Aug 11, 2020
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Lyron, and welcome to my course, Introduction to Information Security within Cloud Computing. I am an international cloud security consultant, author, and trainer at Profabula. The growth of technology, tools, and services in the cloud is exponential, and you can see evidences of this in your cloud management console daily. With an expanding array of cloud services and technology offerings, it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, we are going to identify and select secure cloud services based upon business requirements. Some of the major topics that we will cover include getting familiar with and using a common taxonomy to describe cloud computing, how to use those definitions to address business requirements through the selection of appropriate deployment in service models, and the use of a tool called the Cloud Control Matrix that will allow you to map common cloud security controls with regulatory and legal frameworks. By the end of this course, you will have the knowledge in order to select a secure cloud service that meets business requirements. I hope you'll join me on this journey to learn how to identify and select secure cloud services with the Introduction to Information Security within Cloud Computing course, at Pluralsight.