Information Security of Cloud Computing
COM SCI X 420.12
Learn the vulnerabilities of the cloud model, ways for companies to assess cloud risk and present methods and architectures that mitigate such risks & enhance the security, integrity, and availability of data in the cloud.
What you can learn.
- Identify the major components of cloud computing
- Understand the cyber security risks of cloud computing
- Identify risk mitigation best practices, methodologies, and techniques
- Apply the core concepts of effective project management and vendor management on cloud computing
- Grasp the importance of disaster recovery requirements on the cloud
- Influence the cyber security budgeting process
- Recognize the significance of new, emerging, and disruptive technologies
About this course:
Cloud infrastructure has become the new norm for flexible computing power to supporting a wide range of applications and organizations of any size. As applications have moved to the Cloud, cyber threats have moved as well. Protecting Cloud deployments from attack requires a unique set of approaches, tools, and techniques. This practical course will provide a foundational approach to secure any Cloud infrastructure, with an emphasis on the security principles of Confidentiality, Integrity, and Availability. Key concepts will include Cloud threats, Least Privilege, Defense-in-Depth, Data Asset Protection, Cloud Asset Protection, Identity and Access Management, Vulnerability Management, Network Security, and Cloud Risk Management Processes. Examples will be provided for leading Cloud providers, such as Amazon Web Services (AWS). Current case studies will illustrate key concepts.This course applies towards the following certificates & specializations…
Corporate Education
Learn how we can help your organization meet its professional development goals and corporate training needs.
Donate to UCLA Extension
Support our many efforts to reach communities in need.