Maintain Data Security in the Cloud

In the cloud, data is often unintentionally made accessible to the unauthorized. This course will teach you to protect your cloud data from unauthorized access.
Course info
Level
Intermediate
Updated
Jul 30, 2020
Duration
1h 3m
Table of contents
Description
Course info
Level
Intermediate
Updated
Jul 30, 2020
Duration
1h 3m
Description

IBM estimates that everyday, humanity creates 2.5 quintillion bytes (that is 2.5 followed by18 zeros) of data–This means that 90% of the data in the world today has been created in the last two years alone. In the cloud, data is often unintentionally made accessible to the unauthorized. In this course, Maintain Data Security in the Cloud, you’ll learn to protect your cloud data from unauthorized access. First, you’ll explore and plan your secure deployment path to the cloud. Next, you’ll discover what kind of data security and encryption is utilized for particular types of cloud services. Finally, you’ll log into the AWS management console and learn how to implement controls for workload protection. When you’re finished with this course, you’ll have the skills and knowledge of Maintaining Data Security in the Cloud needed to protect your cloud data from unauthorized access.

About the author
About the author

Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.

More from the author
Perform Cloud Security Operations
Intermediate
48m
Aug 11, 2020
More courses by Lyron Andrews
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Greetings everyone. My name is Lyron, and welcome to my course, Maintain Data Security in the Cloud. I am a cloud security consultant, author, and trainer. IBM estimates that every day humanity creates 2.5 quintillion bytes, that is 2.5 followed by 18 zeros of data. This means that 90% of the data in the world today has been created in the last two years. In this course, you'll learn to protect your cloud data from unauthorized access. Some of the major topics that we will cover include planning the architecture of your secure deployment path to the cloud. Next, you'll discover what kind of data security and encryption is utilized for particular types of cloud services. Finally, you'll log into the AWS Management Console and learn how to implement controls for workload protection. By the end of this course, you'll have the skills and knowledge needed to protect your cloud data from unauthorized access. Before beginning this course, you should be familiar with Implement Infrastructure Security for Cloud course and Manage Cloud Security and Risk course. I hope you'll join me on this journey to learn to protect your cloud data from unauthorized access with the Maintain Data Security in the Cloud course, at Pluralsight.