1. Home
  2. Training Library
  3. Business Management
  4. Courses
  5. Cloud Governance, Risk, and Compliance

Conclusion

Contents

keyboard_tab
Course Introduction and Security Basics
1
Course Introduction
PREVIEW1m 52s
2
Security Basics
PREVIEW5m 48s
Course Conclusion

The course is part of this learning path

AWS Governance & Compliance
course-steps
5
certification
1
lab-steps
2
quiz-steps
2
play-arrow
Start course
Overview
Difficulty
Intermediate
Duration
1h 7m
Students
1363
Ratings
4.3/5
starstarstarstarstar-half
Description

In the last decade, the nature and complexity of security attacks have increased tremendously. From simple attacks, which focused on hacking exposed web pages, we have evolved to stealthy attacks, which focus on the hacker staying hidden for years on end inside the victim’s network with the sole purpose of stealing data.

To make matters worse, more and more companies have started to store their data in the cloud, thereby transferring part of the responsibility of securing that data to the cloud service provider. Therefore these days the cloud service is entrusted with the task of providing adequate security to the data and services that it provides to customers. While making a decision to move to the cloud, the two main metrics that enterprises look at tend to be cost and security risk. This course takes a deep dive into cloud security and how to mitigate the risks facing cloud-based infrastructure.

If you have any feedback relating to this course, feel free to reach out to us at support@cloudacademy.com.

Learning Objectives

  • Understand the basics of cloud security
  • Learn about security techniques such as asset management, access control, physical security, and operations security
  • Understand how to manage the vulnerability of your systems and applications
  • Learn how to monitor and respond to events and security incidents

Intended Audience

  • Solutions architects
  • Data engineers
  • Security engineers
  • Anyone who wants to learn how to secure their cloud infrastructure

Prerequisites

To get the most out of this course, you should already a good understanding of cloud infrastructure and operations. Basic knowledge of IT security would also be beneficial.

Transcript

So now we come to the conclusion of the course. So what did we learn here? It is essential to know exactly where and how much security is needed for resource optimization. Risk Assessment help us in deciding the where and the how much. Asset Inventories are key to doing Risk Assessments. Security Governance decides the security stance of the organization. Security Monitoring ensures whether Security Governance is properly implemented and being adhered to. Incident Management and Root cause analysis lets us know where our security policies and procedures are faulty. Thank you.

About the Author
Avatar
Vish Chidambaram
Enterprise Security Leader
Students
2738
Courses
2

Vish Chidambaram is an Award-winning Enterprise Security Leader with 18+ years of experience skilled in areas spanning Automation, Security Operation Analytics and Reporting, Threat Management Life cycle, Agile/DevOps environments, SaaS/Cloud security, Business Development/Consulting, Program Management and more. Most Recently Vish was the CISO at Rubicon Project, which is a SaaS based ad marketplace where he was responsible for securing a high performance SaaS platform with 40billion transactiions per day. He pioneered the integration of security in DevOps, by using automation, orchestration and machine learning tools He is passionate about teaching security and believes staying current is particularly relevant in the security industry. He also mentors security professionals and advises them thru career transitions. and details can be found at datacoreacademy.com or writing to info@datacoreacademy.com His linked in page is https://www.linkedin.com/in/vish-chidambaram/