Cloud Computing Security

Dr. Jeff Tjiputra, Dr. Richard Utter , USMx

Learn how to identify security issues in the cloud and industry-standard techniques and procedures to prevent and mitigate risks.

How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk.

In this course, part of the Cloud Computing MicroMasters program, you will be introduced to industry best practices for cloud security and learn how to architect and configure security-related features in a cloud platform. Case studies and government standard documents will be reviewed to help ensure appropriate levels of security are implemented.

You’ll develop the necessary skills to identify possible security issues in the cloud environment. You will also gain experience with tools and techniques that monitor the environment and help prevent security breaches such as monitoring logs and implementing appropriate security policies.

Earn up to $225 in AWS promotional credits! 

Students who enroll in this course are eligible for $25 in AWS promotional credit to cover the cost of the hands on labs. Students can claim this credit after completing some initial course work but before beginning the first AWS lab. Students also qualify for an additional $200 AWS promotional credit by purchasing a verified certificate and successfully completing the final project.

 

This course is part of the Cloud Computing MicroMaster’s program from UMUC. Upon completion of the program and receipt of the verified MicroMaster’s certificate, learners may then transition into the full UMUC Master’s Program in Cloud Computing Architecture without any application process or testing. See the MicroMasters program page for more.

 

What will you learn

  • Evaluate security issues with cloud infrastructure
  • Implement cloud features to secure and harden the infrastructure
  • Use tools to analyze system logs to detect possible security or performance problems
  • Review case studies and standard documents on cloud security
  • Understand the use of security policies as part of the overall security strategy of an organization

     

Сессии:
  • 4 июня 2018, 8 недель
Характеристики онлайн курса:
  • Бесплатный:
  • Платный:
  • Сертификат:
  • MOOC:
  • Видеолекции:
  • Аудиолекции:
  • Email-курс:
  • Язык: Английский Gb

Отзывы

Пока никто не написал отзыв по этому курсу. Хотите быть первым?

Зарегистрируйтесь, чтобы оставить отзыв

Ещё курсы на эту тему:
8e901136-3c8a-49c0-a3c2-48e9f5c31fd7-dc0437e2d659.small Introduction to Open Source Networking Technologies
Learn technical fundamentals needed to adopt SDN, NFV, disaggregation, orchestration...
Health-informatics-in-the-cloud-icon600x340 Health Informatics in the Cloud
A non-technical introduction to the contemporary application of computing to...
Small-icon.hover Information Security and Risk Management in Context
Learn to defend and protect vital company information using the latest technology...
Posa-mocca Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
In this course--the second in a trans-institution sequence of MOOCs on Mobile...
Extensionflag Cloud Computing
Cloud computing has entered the mainstream of information technology...
Ещё из рубрики «Компьютерные науки»:
Bb90d02a-a562-4632-a0af-e72987f27fea-081bda0d942b.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
D2fb4b76-e398-42d8-9835-970a49678fa3-27d6ebda8cb9.small Computer Forensics
Learn the process, techniques and tools for performing a digital forensics investigation...
05fa3fc6-a169-41aa-a67c-3985abf7db0b-3bd5f54592bc.small Cybersecurity Capstone
Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters...
8e901136-3c8a-49c0-a3c2-48e9f5c31fd7-dc0437e2d659.small Introduction to Open Source Networking Technologies
Learn technical fundamentals needed to adopt SDN, NFV, disaggregation, orchestration...
Regular_7b541420-e149-42fe-86cd-93e4588aaed5 Why We Post: the Anthropology of Social Media
Discover the varying uses of social media around the world and its consequences...
Ещё от edX:
85efb1e5-3a5f-4208-9557-d49de63f8bf3-99199f8f9c00.small Thinking & Acting like an Entrepreneur
Discover the entrepreneur inside of you – learn what it takes to turn...
19e9fb79-a26b-403d-ace9-90b55f9d1573-91ecb59bf6c2.small Sikhism Through Its Scriptures
This course examines the Sikh scripture from a doctrinal and historical perspective...
B6c4593e-d876-4326-a445-c8777c25cf83-09a793ff9944.small Marketing Management
Learn key marketing strategies and tactics to help your company develop products...
Bb90d02a-a562-4632-a0af-e72987f27fea-081bda0d942b.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
D2fb4b76-e398-42d8-9835-970a49678fa3-27d6ebda8cb9.small Computer Forensics
Learn the process, techniques and tools for performing a digital forensics investigation...

© 2013-2017