{"id":831,"date":"2019-09-17T17:21:44","date_gmt":"2019-09-17T17:21:44","guid":{"rendered":"https:\/\/www.tracston.com\/?page_id=831"},"modified":"2019-09-17T17:23:51","modified_gmt":"2019-09-17T17:23:51","slug":"cloud-security-essentials","status":"publish","type":"page","link":"https:\/\/www.tracston.com\/index.php\/cloud-security-essentials\/","title":{"rendered":"Cloud Security Essentials"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"831\" class=\"elementor elementor-831\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6be665c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6be665c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e4dd18\" data-id=\"2e4dd18\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e8a885 elementor-widget elementor-widget-image\" data-id=\"6e8a885\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"850\" height=\"405\" src=\"https:\/\/www.tracston.com\/wp-content\/uploads\/2019\/09\/cloud_security.png\" class=\"attachment-large size-large wp-image-833\" alt=\"\" srcset=\"https:\/\/www.tracston.com\/wp-content\/uploads\/2019\/09\/cloud_security.png 850w, https:\/\/www.tracston.com\/wp-content\/uploads\/2019\/09\/cloud_security-300x143.png 300w, https:\/\/www.tracston.com\/wp-content\/uploads\/2019\/09\/cloud_security-768x366.png 768w, https:\/\/www.tracston.com\/wp-content\/uploads\/2019\/09\/cloud_security-640x305.png 640w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b35669 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b35669\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fba4b8\" data-id=\"0fba4b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a306bfc elementor-widget elementor-widget-text-editor\" data-id=\"a306bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Cloud Security<\/b> is one of the most discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS) the talk often turns to cloud security. The growing adoption of cloud services will increase the demand for security professionals who can apply the proper controls to public, private, community and hybrid cloud models. Also, cloud service providers, organizations adopting cloud services and professional service firms assisting with cloud management and implementation will all need qualified cloud professionals. As organizations replace traditional IT architectures with cloud models, cloud expertise will move from a &#8220;nice to have&#8221; capability to a &#8220;must have.&#8221;<\/p><p>\u00a0<\/p><p><b>Objectives<\/b><\/p><p>This course is designed to introduce you to fundamental cloud computing and security concepts including access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your security infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c733e52 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c733e52\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b116ad8\" data-id=\"b116ad8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-475ff86 elementor-button-info elementor-widget elementor-widget-button\" data-id=\"475ff86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"\/Courses\/Cloud.Security.Essentials.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-pdf\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cloud Security is one of the most discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS) the talk often turns to cloud security.&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-831","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/pages\/831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/comments?post=831"}],"version-history":[{"count":2,"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/pages\/831\/revisions"}],"predecessor-version":[{"id":834,"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/pages\/831\/revisions\/834"}],"wp:attachment":[{"href":"https:\/\/www.tracston.com\/index.php\/wp-json\/wp\/v2\/media?parent=831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}