In the age of disruption, digitally transformed products and services have enabled more significant innovation, faster go-to-market, and reduced capital expenditure. A majority of these technological advancements rely on the cloud. As a 260 billion dollar industry, with growth expected to rise 14% by 2025, organizations adopt the public cloud at increasing rates. This increased adoption of cloud computing has adversely affected security practices that are not fully transferable from on-premise security programs.
This course will provide a foundational understanding of what is required to secure a cloud ecosystem, regardless of the vendor. The concepts and principles discussed will help bridge the gaps between traditional and cloud architectures while accounting for the shifting thought patterns involving enterprise risk management. Students who complete this course will enter into any organization utilizing the cloud and immediately bring value to the infrastructure and security teams.
Understand core cloud computing concepts and fundamental principles, including standard delivery models and service designs.
Understand the differences between traditional data security practices and cloud-based data security methodologies.
Understand the identity and access management practices of both cloud providers and consumers.
Understand how to protect data-at-rest, data-in-transit, and data-in-use within a cloud environment.
Understand standard cloud security network designs and architecture models.
Understand the complexity of cloud threat actors and techniques used to attack a cloud computing infrastructure
Understand the regulatory requirements needed to secure data in the cloud and the difficulties in meeting those requirements.