Cloud Computing Security

About this Course

How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk. In this course, part of the Cloud Computing MicroMasters program, you will be introduced to industry best practices for cloud security and learn how to architect and configure security-related features in a cloud platform. Case studies and government standard documents will be reviewed to help ensure appropriate levels of security are implemented. You’ll develop the necessary skills to identify possible security issues in the cloud environment. You will also gain experience with tools and techniques that monitor the environment and help prevent security breaches such as monitoring logs and implementing appropriate security policies. This course is part of the Cloud Computing MicroMaster’s program from UMGC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMGC Master’s Program in Cloud Computing Architecture. See the MicroMasters program page for more information.

Created by: University of Maryland Global Campus,University System of Maryland

Level: Intermediate


Related Online Courses

El elemento que ha transformado fuertemente el entorno social, la industria y la manera en la que se entregan los productos y servicios son los Robots. Para la automatización de tareas ya no se ... more
Today more than ever, the optimal use of resources has become a very important issue. Many decision problems (logistics, production, space, etc.) aiming at an optimal use of resources can be... more
The course introduces the basic elements and trends for performing a through built environment assessment and develops the tools for urban sustainability policy impact analysis. During the first... more
Within this course, you will explore database architecture, PostgreSQL, and various scalable deployment configurations. You will see how PostgreSQL implements basic CRUD operations and indexes, and... more
The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL