From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Cryptography, sandboxing, virtualization, and orchestration

Cryptography, sandboxing, virtualization, and orchestration

From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Cryptography, sandboxing, virtualization, and orchestration

- [Presenter] Welcome to this lesson on cryptography, sandboxing, virtualization, and orchestration. Of course, in this lesson, the objectives are going to be to discuss some key concepts related to each of these four topics, cryptography, sandboxing, virtualization, and finally, orchestration. Starting with cryptography, I think we've established sufficiently that cryptography and the process of encryption and encrypting data, both at rest and in transit, is a critical aspect of securing components and information in this digital world. That doesn't change at all in the realm of cloud computing, and it is equally, if not more so important for protecting our sensitive data. This serves as the primary defense for data confidentiality. And that encompasses encryption at, again, those various states being data at rest and data in motion. Another critical component here is the management of the keys that we're using to protect that data. And many cloud service providers offer encryption…

Contents