Description
In this module, you will learn about Protecting Cloud Data, Cloud data life cycle phases, Data dispersion and flow. Storage types, Threats to storage types, Data obfuscation, Big Data Structure, Data classification policy, Data localization, Data mapping, Data labeling, Information Rights Management, Legal hold, Supplemental security components, Hardware security module, Trusted Platform Module, Security management tools, Virtual hardware security, Virtual Operating Systems and Hypervisors.
Security Awareness, Education and Training
Physical Site Design
Risk Response
Introduction to Risk
Security Design Principles
Confidentiality, Integrity and Availability
Access Control



