Introduction
Cloud data
()
What you need to know
()
Study resources
()
Cloud data lifecycle
()
1. Cloud Data Storage
Block storage types
()
Data dispersion
()
Cloud storage security threats
()
2. Encryption
Understanding encryption
()
Symmetric and asymmetric cryptography
()
Goals of cryptography
()
Choosing encryption algorithms
()
3. Key Management
Key exchange
()
Diffie-Hellman
()
Key escrow
()
Hardware security modules
()
4. Public Key Infrastructure
Trust models
()
PKI and digital certificates
()
Hash functions
()
Digital signatures
()
Creating a digital certificate
()
Revoking a digital certificate
()
5. Cryptographic Applications
TLS and SSL
()
Securing common protocols
()
6. Data Protection
Data anonymization
()
Data obfuscation
()
Don't use the last four digits of SSNs
()
Data loss prevention
()
7. Information Management
Information classification
()
Data discovery
()
Information rights management
()
Intellectual property
()
Data security policies
()
eDiscovery and evidence preservation
()
8. Data Event Auditability
Security event logging
()
Tuning and configuring SIEMs
()
Continuous security monitoring
()
Chain of custody
()
Conclusion
What's next?
()