Cloud Computing Security

Jeff Tjiputra, Charif El MaMouni, USMx

Learn how to identify security issues in the cloud and industry-standard techniques and procedures to prevent and mitigate risks.

How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk.

In this course, part of the Cloud Computing MicroMasters program, you will be introduced to industry best practices for cloud security and learn how to architect and configure security-related features in a cloud platform. Case studies and government standard documents will be reviewed to help ensure appropriate levels of security are implemented.

You’ll develop the necessary skills to identify possible security issues in the cloud environment. You will also gain experience with tools and techniques that monitor the environment and help prevent security breaches such as monitoring logs and implementing appropriate security policies.

Earn up to $225 in AWS promotional credits! 

Students who enroll in this course are eligible for $25 in AWS promotional credit to cover the cost of the hands on labs. Students can claim this credit after completing some initial course work but before beginning the first AWS lab. Students also qualify for an additional $200 AWS promotional credit by purchasing a verified certificate and successfully completing the final project.

This course is part of the Cloud Computing MicroMaster’s program from UMUC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMUC Master’s Program in Cloud Computing Architecture. See the MicroMasters program page for more information.

What will you learn

  • Evaluate security issues with cloud infrastructure
  • Implement cloud features to secure and harden the infrastructure
  • Use tools to analyze system logs to detect possible security or performance problems
  • Review case studies and standard documents on cloud security
  • Understand the use of security policies as part of the overall security strategy of an organization

     

Dates:
  • 22 May 2019
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

More on this topic:
A58d02d2-ee6b-4903-8075-15d516b28254-a03357c436cb.small Enabling Technologies for Data Science and Analytics: The Internet of Things
Discover the relationship between Big Data and the Internet of Things (IoT)...
633b558d-9c96-4b94-a4ba-bca5ac84e9d2-f2b53fccd54b.small Digital Ecosystem Infrastructure
Learn the fundamentals of cloud computing and its impact on IT and business...
Health-informatics-in-the-cloud-icon600x340 Health Informatics in the Cloud
A non-technical introduction to the contemporary application of computing to...
Small-icon.hover Information Security and Risk Management in Context
Learn to defend and protect vital company information using the latest technology...
Posa-mocca Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
In this course--the second in a trans-institution sequence of MOOCs on Mobile...
More from 'Computer Science':
D2868c46-5a91-4766-a2a4-891bcc5af93b-ada68a2be755.small Building a Cybersecurity Toolkit
Develop a set of skills and characteristics that expand beyond technical proficiency...
21be6203-b140-422c-9233-a1dc278d7266-1cbbdfc6b0f4.small Big Data Analytics Using Spark
Learn how to analyze large datasets using Jupyter notebooks, MapReduce and Spark...
D56e7ceb-e866-4007-b915-dcc34c7ef8ee-ecf353296d1d.small Enterprise Data Management
Understand structured transactional data and known questions along with unknown...
6d40d803-76af-452b-8609-0dbadbe37fee-f15aea6c23c4.small HTML5 Apps and Games
Today, developers are increasingly moving from native to HTML5-based apps. Increase...
8cb36526-6532-4b87-89b1-5dfee8ffd43e-daf15f6c0a0a.small Programming Reactive Systems
Principles of Reactive Programming in Scala. Reactive programming is a set of...
More from 'edX':
D2868c46-5a91-4766-a2a4-891bcc5af93b-ada68a2be755.small Building a Cybersecurity Toolkit
Develop a set of skills and characteristics that expand beyond technical proficiency...
3549b0ac-892b-47a5-90fc-fa44b43f79b9-4331f8104748.small Storytelling in the Workplace
Learn how to craft messages and narratives that will resonate with your target...
Ab312b37-f7b7-4d6c-8a79-5b945e1f0f8e-b61136860777.small Capstone Assessment: Leadership in Global Development
Demonstrate the knowledge and skills acquired in the Leadership in Global Development...
Fd75b745-3d53-46c9-bd48-285cf079fc2a-5b5524dcf602.small States and Markets in the Global Economy
Learn to predict financial crises, handle unfair trade practices and minimize...
21be6203-b140-422c-9233-a1dc278d7266-1cbbdfc6b0f4.small Big Data Analytics Using Spark
Learn how to analyze large datasets using Jupyter notebooks, MapReduce and Spark...

© 2013-2017