Cloud Security Considerations for General Industry

Go to class
Write Review

Free Online Course: Cloud Security Considerations for General Industry provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cloud Security Considerations for General Industry is taught by Kevin L. Jackson.

Overview
  • Explore the cybersecurity challenges impacting businesses in non-highly regulated industries. Learn about key security controls and examine security requirements around the world.

Syllabus
  • Introduction

    • Protect general business data
    • What you should know
    • Security considerations for general business
    1. Cloud Computing Overview
    • Cloud computing key drivers
    • Cloud computing characteristics
    • Deployment models
    • Service models
    • IT implementation options
    • Infrastructure attack vectors
    • Software attack vectors
    • Critical vulnerabilities
    2. General Business Approach to Cybersecurity
    • Examine security requirements within general business
    • Cyber threats to general business
    • Cyber organizations in general business
    3. Regional Data Protection and Privacy Requirements
    • Geographic impact
    • Data protection and privacy requirements
    • Data and privacy in Australia
    • Data and privacy in China
    • Data and privacy in Japan
    • Data and privacy in India
    • Data and privacy in Russia
    • Data and privacy in Switzerland
    • Data and privacy in Germany
    • Data and privacy in the UK
    • Data and privacy in Brazil
    • Data and privacy in the United States
    • Data and privacy in the Middle East and Africa
    4. Regional Risk and Compliance Requirements
    • Examine risk and compliance requirements
    • Risk and compliance requirements in Asia
    • Risk and compliance requirements in Europe
    • Risk and compliance requirements in the Americas
    5. Key Threats and Controls in Financial Cloud Security
    • Treacherous 12
    • Case Study: Dirty COW
    • Case Study: Net Traveler
    Conclusion
    • Next steps