Cloud Computing Security & Risk - Training Course

Cloud Computing Security & Risk - Training Course

Author: Corey Charles
$6,500.00 $1,399.00

The course covers cloud security principles, patterns and architectural frameworks, data protection and compliance for cloud-based applications, data and infrastructure, and the design, development, and implementation of cloud security architectures.

Course Name Cloud Computing Security & Risk - Training Course
Author Corey Charles
Type Course

The course covers cloud security principles, patterns and architectural frameworks, data protection and compliance for cloud-based applications, data and infrastructure, and the design, development, and implementation of cloud security architectures.

Cloud Security is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models--software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS)--the talk often turns to cloud security.

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need to ensure the best adaptable and equipped solution to handle the wider range of cyber attacks.

Who this course is for:
  • All levels of IT Security and Networking Professionals
  • All new students who are looking transition into cloud security

25 Lectures and 4:30 Hours
Full lifetime access
Access on mobile and TV
Certificate of Completion
20 students enrolled

Corey Charles

Corey Charles is Security+, Qualys Vulnerability Management Specialist Certified. Mr. Charles has 11 years experience in IT Security with a direct focus in Vulnerability Management. Mr. Charles also taught on the collegiate level, teaching IT Security at Herzing University.

Mr. Charles also holds two Bachelors of Arts Degrees, Digital Design, and Media Arts, one Associates, Digital Design from Tulane University. Two Master Degrees from Strayer University, Master of Science in Computer 
Security Management and Master of Science in Computer Forensics Management. He holds an Executive Graduate Certification in Computer Networking.