Useful Links
Computer Science
Cloud Computing
Cloud Security
1. Foundations of Cloud Security
2. Cloud Governance and Risk Management
3. Identity and Access Management (IAM)
4. Infrastructure Security
5. Data Protection and Encryption
6. Application Security
7. Security Operations and Monitoring
8. DevSecOps and Automation
9. Emerging Technologies and Advanced Topics
Data Protection and Encryption
Data Classification and Governance
Data Discovery
Automated Discovery Tools
Data Inventory Management
Sensitive Data Identification
Data Classification Schemes
Sensitivity Levels
Regulatory Classifications
Business Impact Classifications
Data Labeling and Tagging
Metadata Management
Automated Labeling
Label Enforcement
Data Lifecycle Management
Data Creation
Data Usage
Data Archival
Data Destruction
Encryption Technologies
Cryptographic Fundamentals
Symmetric Encryption
Asymmetric Encryption
Hash Functions
Digital Signatures
Data at Rest Encryption
Full Disk Encryption
Database Encryption
File-Level Encryption
Object Storage Encryption
Data in Transit Encryption
Transport Layer Security (TLS)
IPSec
Application-Level Encryption
Data in Use Protection
Homomorphic Encryption
Secure Multi-Party Computation
Trusted Execution Environments
Key Management
Key Management Principles
Key Generation
Key Distribution
Key Storage
Key Rotation
Key Destruction
Key Management Services
Cloud-Native KMS
Hardware Security Modules
Key Escrow Services
Key Management Policies
Key Lifecycle Policies
Access Control Policies
Audit and Compliance Policies
Customer Key Management
Customer-Managed Keys
Bring Your Own Key (BYOK)
Hold Your Own Key (HYOK)
Data Loss Prevention
DLP Strategy Development
Policy Definition
Risk Assessment
Implementation Planning
DLP Technologies
Network DLP
Endpoint DLP
Storage DLP
Cloud DLP
Content Inspection
Pattern Matching
Statistical Analysis
Machine Learning Detection
Data Exfiltration Prevention
Channel Monitoring
Behavioral Analysis
Anomaly Detection
Database Security
Database Access Controls
Authentication Mechanisms
Authorization Models
Privilege Management
Database Encryption
Transparent Data Encryption
Column-Level Encryption
Application-Level Encryption
Database Activity Monitoring
Query Monitoring
Access Logging
Anomaly Detection
Data Masking and Anonymization
Static Data Masking
Dynamic Data Masking
Tokenization
Pseudonymization
Previous
4. Infrastructure Security
Go to top
Next
6. Application Security