Cloud Security Considerations for General Industry

Cloud Security Considerations for General Industry

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 35m | 189 MB

Is your business looking to make a move to cloud computing? In this course, instructor Kevin L. Jackson explores the cybersecurity challenges impacting businesses in non-highly regulated industries. Kevin explores the cloud security requirements specific to general industry, broken down by region: Asia, the Middle East, Europe, Oceania, Africa, and the Americas. He provides a preliminary overview of cloud computing and its vulnerabilities, as well as the general business approach to cybersecurity. He then provides regional breakdowns, exploring security requirements for each area. The course concludes with a review of key threats and some real-world case studies that show how different security controls can be used to defend enterprises from similar attacks.

Topics include:

  • Cloud computing characteristics
  • Deployment and service models
  • IT implementation options
  • Cyber threats to general business
  • Regional data protection and privacy requirements
  • Examining risk and compliance requirements
Table of Contents

1 Protect general business data
2 What you should know
3 Security considerations for general business
4 Cloud computing key drivers
5 Cloud computing characteristics
6 Deployment models
7 Service models
8 IT implementation options
9 Infrastructure attack vectors
10 Software attack vectors
11 Critical vulnerabilities
12 Examine security requirements within general business
13 Cyber threats to general business
14 Cyber organizations in general business
15 Geographic impact
16 Data protection and privacy requirements
17 Data and privacy in Australia
18 Data and privacy in China
19 Data and privacy in Japan
20 Data and privacy in India
21 Data and privacy in Russia
22 Data and privacy in Switzerland
23 Data and privacy in Germany
24 Data and privacy in the UK
25 Data and privacy in Brazil
26 Data and privacy in the United States
27 Data and privacy in the Middle East and Africa
28 Examine risk and compliance requirements
29 Risk and compliance requirements in Asia
30 Risk and compliance requirements in Europe
31 Risk and compliance requirements in the Americas
32 Treacherous 12
33 Case Study Dirty COW
34 Case Study Net Traveler
35 Next steps