IT Skills Cloud Computing and Virtualization Cloud and Virtualization Fundamentals Cloud Computing Technology Fundamentals
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
Objectives |
---|
Identity and Access Management
Federation and Access Control
Identity as a Service
Cloud Presence
Cloud Privacy
Practice: Access Control and Privacy
|