Course

Cloud and Wireless Security

(ISC)²

Course 6: Cloud and Wireless Security Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both transformations are complex topics. However, as a security practitioner, we can narrow these two topics by applying the security fundamentals to secure the data. This boils down to the three basics of protecting data at rest, in motion, and in use. The data is either on the endpoint devices, servers, or other endpoints, making these services a reality. Course 6 Learning Objectives After completing this course, the participant will be able to: L6.1 - Recall cloud security concepts and configurations. L6.2 - Recognize types of virtualization and cloud security considerations. L6.3 - Summarize the types of telecommunications and network access controls. Course Agenda Module 1: Operate and Configure Cloud Security (Domain 7 - Systems and Application Security) Module 2: Cloud Security Considerations (Domain 6 - Network and Communications Security) Module 3: Secure Wireless Configurations (Domain 6 - Network and Communications Security) Who Should Take This Course: Beginners Experience Required: No prior experience required

Certificate Available ✔

Get Started / More Info
Cloud and Wireless Security
More Security Courses

Privacy Fundamentals

Infosec

The Privacy Fundamentals course introduces students to fundamental privacy concepts, frameworks and laws.\n\nThis specialization provides students with a foundational...

Introducing Security: Aligning Asset and Risk Management

(ISC)²

Course 1 - Introducing Security and Aligning Asset Management to Risk Management In this course, we're going to start by discussing the security concepts, identifying...

Planning, Auditing and Maintaining Enterprise Systems

University of Colorado System

Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the...

Windows Registry Forensics

Infosec

The Windows Registry Forensics course shows you how to examine the live registry, the location of the registry files on the forensic image, and how to extract files....