Cloud Security Considerations for the Financial Services Industry

Go to class
Write Review

Free Online Course: Cloud Security Considerations for the Financial Services Industry provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cloud Security Considerations for the Financial Services Industry is taught by Kevin L. Jackson.

Overview
  • Get a region-by-region breakdown of the data protection and privacy laws and unique cybersecurity challenges facing the financial services industry.

Syllabus
  • Introduction

    • Protecting financial data
    • What you should know
    • Security for the financial industry
    1. Cloud Computing Overview
    • Cloud-computing key drivers
    • Cloud-computing characteristics
    • Deployment models
    • Service models
    • IT implementation options
    • Infrastructure attack vectors
    • Software attack vectors
    • Critical vulnerabilities
    2. Financial Services Industry's Approach to Cybersecurity
    • Examining security requirements within the financial services industry
    • Cyber threats to financial services
    • Cyber organizations in financial services
    3. Regional Data Protection and Privacy Requirements
    • Geographic impact
    • Data protection and privacy requirements
    • Data and privacy in Australia
    • Data and privacy in China
    • Data and privacy in Japan
    • Data and privacy in India
    • Data and privacy in Russia
    • Data and privacy in Switzerland
    • Data and privacy in Germany
    • Data and privacy in the UK
    • Data and privacy in Brazil
    • Data and privacy in the United States
    • Data and privacy in the Middle East and Africa
    4. Regional Risk and Compliance Requirements
    • Examining risk and compliance requirements
    • Risk and compliance requirements in Oceania and Asia
    • Risk and compliance requirements in Europe
    • Risk and compliance requirements in the Americas
    5. Key Threats and Controls in Financial Cloud Security
    • Treacherous 12
    • Case study: Dirty COW
    • Case study: NetTraveler
    Conclusion
    • Next steps