This course gives learners an opportunity to explore data security in the cloud. In this course, learners will:
์ ๊ณต์:
์ด ๊ฐ์ข์ ๋ํ์ฌ
Complete Cloud Security Basics, the first course in the Cloud Security specialization.
๋ฐฐ์ธ ๋ด์ฉ
How to analyze a data breach and trace it back to the vulnerability that made it possible.
How data security and privacy requirements arise from legal obligations and industry standards.
๊ทํ๊ฐ ์ต๋ํ ๊ธฐ์
Complete Cloud Security Basics, the first course in the Cloud Security specialization.
์ ๊ณต์:

๋ฏธ๋ค์ํ ๋ํ๊ต
The University of Minnesota is among the largest public research universities in the country, offering undergraduate, graduate, and professional students a multitude of opportunities for study and research. Located at the heart of one of the nationโs most vibrant, diverse metropolitan communities, students on the campuses in Minneapolis and St. Paul benefit from extensive partnerships with world-renowned health centers, international corporations, government agencies, and arts, nonprofit, and public service organizations.
๊ฐ์ ๊ณํ - ์ด ๊ฐ์ข์์ ๋ฐฐ์ธ ๋ด์ฉ
Organizing and Protecting Data
We organize our data into databases and structures to optimize our processing efforts. Data organization also impacts how we protect our data.
SQL and Data Breaches
Many systems rely on the Structured Query Language, and this has yielded some notorious security problems.
What Vendors Provide
Each cloud vendor offers a variety of data storage and structuring services. While each vendor has their unique jargon, most services fall into well-known categories. We will examine these categories and use them to review could provider offerings.
Data Privacy and the Cloud
Privacy regulations give individuals some control over data collected about them by organizations. International trade makes it important to fulfill privacy expectations of other countries and regions.
Cybersecurity in the Cloud ํนํ ๊ณผ์ ์ ๋ณด
This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks.

์์ฃผ ๋ฌป๋ ์ง๋ฌธ
๊ฐ์ ๋ฐ ๊ณผ์ ๋ฅผ ์ธ์ ์ด์ฉํ ์ ์๊ฒ ๋๋์?
์ด ์ ๋ฌธ ๋ถ์ผ๋ฅผ ๊ตฌ๋ ํ๋ฉด ๋ฌด์์ ์ด์ฉํ ์ ์๋์?
Is financial aid available?
Can I take this course without completing the first course in this specialization?
๊ฐ์ข๋ฅผ ์๋ฃํ๋ฉด ๋ํ ํ์ ์ ๋ฐ์ ์ ์๋์?
๊ถ๊ธํ ์ ์ด ๋ ์์ผ์ ๊ฐ์? ํ์ต์ ๋์๋ง ์ผํฐ๋ฅผ ๋ฐฉ๋ฌธํด ๋ณด์ธ์.