Students in this course are introduced to the concepts of virtualization security including the types of virtualization, the importance of securing virtualized networks and discussions of the various virtualization program offerings. Additionally, students in this course are introduced to the concepts of cloud security. Students will understand the strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure. Students will also gain an understanding of how to analyze and implement security for public and private clouds. In this course, students will learn about implementations of effective practices for securing virtual machines without creating additional operational overhead for administrators. In addition, students will learn how to protect networks, operating systems and applications in various cloud deployments.
Learning Objectives
Discuss secure database features.
Identify security models in database system development.
Implement trust management techniques in a database system.
Framework Connections
Specialty Areas
- Cyber Defense Infrastructure Support
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.