Cloud Security Considerations for Government and the Military

Go to class
Write Review

Free Online Course: Cloud Security Considerations for Government and the Military provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cloud Security Considerations for Government and the Military is taught by Kevin L. Jackson.

Overview
  • Explore cloud security considerations unique to the government and military, including data protection, privacy, risk, and compliance requirements around the world.

Syllabus
  • Introduction

    • Protect government and military data
    • What you should know
    • Security considerations for the government and military industries
    1. Cloud Computing Overview
    • Key cloud computing drivers
    • Cloud computing characteristics
    • Deployment models
    • Service models
    • IT implementation options
    • Infrastructure attack vectors
    • Software attack vectors
    • Critical vulnerabilities
    2. Government Approach to Cybersecurity
    • Examine security requirements
    • Cyber threats to government
    • CISO expectations in government
    3. Regional Data Protection and Privacy Requirements
    • Geographic impact
    • Data protection and privacy requirements
    • Data and privacy in Australia
    • Data and privacy in China
    • Data and privacy in Japan
    • Data and privacy in India
    • Data and privacy in Russia
    • Data and privacy in Switzerland
    • Data and privacy in Germany
    • Data and privacy in the UK
    • Data and privacy in Brazil
    • Data and privacy in the United States
    • Data and privacy in the Middle East and Africa
    4. Regional Risk and Compliance Requirements
    • Examine risk and compliance requirements
    • Risk and compliance requirements in Oceania
    • Risk and compliance requirements in Europe
    • Risk and compliance requirements in the Americas
    5. Key Threats and Controls in Government Cloud Security
    • Treacherous 12
    • Government relevant case study #2
    • Government relevant case study #1
    Conclusion
    • Next steps