• Online, Self-Paced
Course Description

Systems and applications running in the cloud are subject to malicious attacks. Explore best practices for cloud security, including operation and service models, virtualization, legal and privacy concerns, data storage, and outsourcing.

Learning Objectives

{"distinguish between cloud security operation models"}

Framework Connections