Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CCSK Cert Prep: 4 Data Security for Computing

Description

Advance your preparation for the CCSK exam and learn the skills you need to provide confidentiality for data in transit and at rest in the cloud.

Tags

Syllabus

Syllabus IntroductionData security and the cloudWhat you should know1. Data Security Mechanisms in the CloudThe data security lifecycleCloud storage solutionsCloud encryption solutionsCloud data security and the Cloud Controls Matrix2. Cloud Storage SecurityCreating a Microsoft Azure Storage accountConfiguring storage account tiersStorage account encryptionStorage account lifecycle managementStorage account keys and shared access signatures3. Cloud Databases and SecurityDeploying PaaS cloud databasesCloud database securityCloud database replicationCloud database RBAC roles4. Data Security and Encryption KeysEncryption keysDeploying a Microsoft Azure Key VaultManaged disk encryptionLinux virtual machines and SSH public key authenticationConclusionNext steps


CCSK Cert Prep: 4 Data Security for Computing

Affiliate notice

Advance your preparation for the CCSK exam and learn the skills you need to provide confidentiality for data in transit and at rest in the cloud.

Syllabus IntroductionData security and the cloudWhat you should know1. Data Security Mechanisms in the CloudThe data security lifecycleCloud storage solutionsCloud encryption solutionsCloud data security and the Cloud Controls Matrix2. Cloud Storage SecurityCreating a Microsoft Azure Storage accountConfiguring storage account tiersStorage account encryptionStorage account lifecycle managementStorage account keys and shared access signatures3. Cloud Databases and SecurityDeploying PaaS cloud databasesCloud database securityCloud database replicationCloud database RBAC roles4. Data Security and Encryption KeysEncryption keysDeploying a Microsoft Azure Key VaultManaged disk encryptionLinux virtual machines and SSH public key authenticationConclusionNext steps