Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Cloud Data Security

Course Cover
compare button icon

Course Features

icon

Duration

11 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

11 hours

Course Description

This course gives learners an opportunity to explore data security in the cloud. In this course, learners will:

* Dive into the data services offered by cloud providers and compare their security features. * Analyze a data breach and trace it back to the vulnerability that made it possible. * Learn about database injection and aggregation attacks. * Follow the life cycle of a data item and its relationship to privacy and integrity. * Associate modern privacy requirements with US and European laws.

Course Overview

projects-img

International Faculty

projects-img

Hands-On Training,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

How to analyze a data breach and trace it back to the vulnerability that made it possible

How data security and privacy requirements arise from legal obligations and industry standards

Course Instructors

Author Image

Rick Smith

Computer Science and Engineering

Richard E. (Rick) Smith was first introduced to computers in the 1950s when his father took him to the unveiling of a Univac supercomputer. It used transistors and magnetic tapes. After receiving a B...
Course Cover