Students in this course are introduced to the concepts of virtualization security including the types of virtualization, the importance of securing virtualized networks and discussions of the various virtualization program offerings. Additionally, students in this course are introduced to the concepts of cloud security. Students will understand the strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure. Students will also gain an understanding of how to analyze and implement security for public and private clouds. In this course, students will learn about implementations of effective practices for securing virtual machines without creating additional operational overhead for administrators. In addition, students will learn how to protect networks, operating systems and applications in various cloud deployments.
Learning Objectives
Discuss secure database features.
Identify security models in database system development.
Implement trust management techniques in a database system.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Infrastructure Support
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.