Overview/Description Target Audience Expected Duration Lesson Objectives Course Number Overview/Description
This course explores some of the key risk areas when it comes to security and cloud computing. Although some of the fears in regards to security in the cloud are exaggerated, there are specific areas to be aware and cautious about. The key is knowing your IT infrastructure and needs, as well as carefully assessing the cloud provider offering and security measures. The course introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. Along with the top identified security risks, it outlines basic guidelines that should be followed to ensure an adequate level of security in an xaaS environment. In particular, key areas of the IT infrastructure and issues relating to data transfer and storage are covered.
This course is intended for IT professionals including managers, engineers, and technical staff evaluating or implementing cloud computing applications and services. The course outlines the benefits and downfalls of implementing or using services in a cloud and helps IT professionals determine what types of technology or services are suitable for cloud networks and how those services are hosted in a cloud computing environment.