Participation in cloud storage and cloud computing is becoming less and less of an option and more of an industry standard. As organizations begin moving critical processes to the cloud, it is important they assess cloud providers' internal controls to ensure data integrity, availability and privacy. In this course we discuss techniques and methodologies for evaluating cloud service providers, critical implementation procedures, security configurations and on-going monitoring practices critical to working securely in the Cloud.
This course provides you with infrastructure and control requirements to consider when moving to a cloud solution. We walk through sample cloud processes and discuss critical points of consideration. Lastly, we discuss control procedures and security measures that should be defined as part of the cloud environment.
Learning Objectives
- Explore cloud solutions.
- Discover cloud implementation techniques and control procedures.
- Identify critical control points when working in the cloud.
- Explore security configuration and on-going monitoring of the cloud environment.
- 1. Power BI: Building Interactive Dashboards
- 2. Calculating Blockchain Application ROI
- 3. Advanced Blockchain Business Applications
- 4. Working Capital Management
- 5. Get the Most From Microsoft Outlook to Manage Your Time, Projects, People and Ideas
- 6. GAP Analysis: A Practical Approach
- 7. Auditing Data Security IT Computer Controls
- 8. Eight Principles of Effective Email
- 9. How To Increase the ROI Of ERP System Implementations
- 10. Taming the E-mail Beast: Key Strategies for Managing E-mail/Input Overload for Microsoft Outlook Users
21 Reviews (108 ratings)
Prerequisites
No advanced preparation or prerequisites are required for this course.