Cybersecurity with Cloud Computing.
(eVideo)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2020.
Format
eVideo
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Language
English

Notes

General Note
7/23/202012:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
Description
More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Shore, M. (2020). Cybersecurity with Cloud Computing . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Shore, Malcolm. 2020. Cybersecurity With Cloud Computing. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Shore, Malcolm. Cybersecurity With Cloud Computing linkedin.com, 2020.

MLA Citation, 9th Edition (style guide)

Shore, Malcolm. Cybersecurity With Cloud Computing linkedin.com, 2020.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
4ae7a4f6-407b-12bc-4d7f-c439c9e01ba0-eng
Go To Grouped Work

Grouping Information

Grouped Work ID4ae7a4f6-407b-12bc-4d7f-c439c9e01ba0-eng
Full titlecybersecurity with cloud computing
Authorshore malcolm
Grouping Categorymovie
Last Update2024-04-01 10:58:15AM
Last Indexed2024-04-20 02:16:41AM

Marc Record

First DetectedJan 10, 2024 11:16:29 AM
Last File Modification TimeApr 01, 2024 10:58:47 AM

MARC Record

LEADER02447ngm a22003133i 4500
001LDC2312494
003LDC
00520240401155318.0
006m        c        
007cr cna       a
008240401s2020    cau147        o   vleng d
040 |a linkedin.com|b eng
050 4|a LDC2312494
1001 |a Shore, Malcolm|e speaker.
24510|a Cybersecurity with Cloud Computing.|c with Malcolm Shore
264 1|a Carpenteria, CA|b linkedin.com,|c 2020.
306 |a 02h:27m:56s
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
500 |a 7/23/202012:00:00AM
5111 |a Presenter: Malcolm Shore
520 |a Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
520 |a More and more companies are migrating their applications and infrastructure to the cloud, shifting operational aspects to service providers such as Microsoft and Amazon. However, cloud computing is a shared responsibility, especially when it comes to keeping your data, users, and systems safe. In this course, Malcolm Shore outlines the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks. He introduces concepts such as software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) and the different deployment models available. He then reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. Malcolm also shows the Security as a Service (SecaaS) capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place.
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
655 4|a Instructional films.|2 lcgft
655 4|a Educational films.|2 lcgft
7102 |a linkedin.com (Firm)
85640|u https://www.linkedin.com/learning/cybersecurity-with-cloud-computing-2?u=93555873&auth=true|z View course details on linkedin.com/learning
85642|3 thumbnail|u https://media.licdn.com/dms/image/C4D0DAQEWS3tcPuXpfA/learning-public-crop_288_512/0/1595272110364?e=2147483647&v=beta&t=FSFvx_s9zreLhwKsMcSM0349O60_4XN9l8LVGryzqNo