Uptime logo
Uptime logo
CreatorsSign in

Get in touch

Contact usFAQ
InstagramFacebookTwitterLinkedIn
CreatorsSign in
en

Course Hack
Cybersecurity with Cloud ComputingBy Malcolm Shore

In a Nutshell

Cybersecurity with Cloud Computing is an introductory course designed to help us understand how we can safely use cloud technology in our organizations.

Favorite Quote

Protection of data is a shared responsibility. The owner retains the risk and liability for data, whilst the service provider is a custodian with contractual obligations.

Dr. Malcolm Shore

Introduction

Cloud technology is slowly becoming the most logical way to support every organizational function.

But many people still don't fully understand how cloud technology works, or how to use it safely.

Dr. Malcolm Shore is a cybersecurity consultant and expert in all things IT, from systems programming to policy and strategic planning.

Currently an adjunct professor at Melbourne's Deakin University Cybersecurity Research Institute and Chief Security Architect at David Lynas Consulting, Shore has held key roles in industry and education over the course of his decades-long career.

In this 2020 course, Shore explains cloud technology, the benefits and risks associated with using it, and how we can mitigate those risks.

Cybersecurity with Cloud Computing provides a breakdown of the major forms of cloud technology, as well as an introduction to cloud legislation and knowledge resources.

Here are the 3 key insights from this Hack

  1. 1.
    Cloud technology has revolutionized the way we use computing resources
  2. 2.
    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc volutpat, leo ut.
  3. 3.
    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc volutpat, leo ut.
To see the rest,Download the app

Thousands more Hacks on Uptime

Stand out from the crowd

Uptime helps you save time, reach your goals, and feel more confident across any area of your life.