Objectives
To successfully complete this learning unit, you will be expected to:
1. Identify the strategies IT and information security professionals can follow to mitigate any potential risk to the network.
2. Create a diagram for a basic modern network architecture for a specific scenario.
3. Compare and contrast the roles of network and security administrators specific to design, architecture, configuration, and monitoring.
4. Exhibit proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
- Accordion Toolbar
- Required Reading
Use Cloud Security: A Comprehensive Guide to Secure Cloud Computing to read the following:
1. Chapter 1, "Cloud Computing Fundamentals," pages 1–32.
2. Chapter 2, "Cloud Computing Architecture," pages 33–60.
3. Chapter 6, "Cloud Computing Security Architecture," pages 177–216.
Use the Internet to read the following:
4. "A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks."
Optional Skillsoft Resource
5. Skillsoft. (n.d.). CISSP: Risk management [Tutorial].