Companies Home Search Profile

Cloud Security Considerations for General Industry

Focused View

Kevin L. Jackson

1:46:19

6 View
  • 01 - Protect general business data.mp4
    01:26
  • 02 - What you should know.mp4
    01:07
  • 03 - Security considerations for general business.mp4
    02:14
  • 01 - Cloud computing key drivers.mp4
    02:32
  • 02 - Cloud computing characteristics.mp4
    03:20
  • 03 - Deployment models.mp4
    02:53
  • 04 - Service models.mp4
    06:58
  • 05 - IT implementation options.mp4
    01:47
  • 06 - Infrastructure attack vectors.mp4
    01:25
  • 07 - Software attack vectors.mp4
    02:24
  • 08 - Critical vulnerabilities.mp4
    03:21
  • 01 - Examine security requirements within general business.mp4
    00:59
  • 02 - Cyber threats to general business.mp4
    01:16
  • 03 - Cyber organizations in general business.mp4
    01:18
  • 01 - Geographic impact.mp4
    01:35
  • 02 - Data protection and privacy requirements.mp4
    01:31
  • 03 - Data and privacy in Australia.mp4
    02:33
  • 04 - Data and privacy in China.mp4
    04:40
  • 05 - Data and privacy in Japan.mp4
    03:48
  • 06 - Data and privacy in India.mp4
    04:12
  • 07 - Data and privacy in Russia.mp4
    04:18
  • 08 - Data and privacy in Switzerland.mp4
    04:13
  • 09 - Data and privacy in Germany.mp4
    03:48
  • 10 - Data and privacy in the UK.mp4
    04:04
  • 11 - Data and privacy in Brazil.mp4
    03:35
  • 12 - Data and privacy in the United States.mp4
    05:46
  • 13 - Data and privacy in the Middle East and Africa.mp4
    03:09
  • 01 - Examine risk and compliance requirements.mp4
    03:00
  • 02 - Risk and compliance requirements in Asia.mp4
    02:43
  • 03 - Risk and compliance requirements in Europe.mp4
    05:53
  • 04 - Risk and compliance requirements in the Americas.mp4
    01:09
  • 01 - Treacherous 12.mp4
    08:01
  • 02 - Case Study Dirty COW.mp4
    02:13
  • 03 - Case Study Net Traveler.mp4
    02:12
  • 01 - Next steps.mp4
    00:56
  • Description


    Is your business looking to make a move to cloud computing? In this course, instructor Kevin L. Jackson explores the cybersecurity challenges impacting businesses in non-highly regulated industries. Kevin explores the cloud security requirements specific to general industry, broken down by region: Asia, the Middle East, Europe, Oceania, Africa, and the Americas. He provides a preliminary overview of cloud computing and its vulnerabilities, as well as the general business approach to cybersecurity. He then provides regional breakdowns, exploring security requirements for each area. The course concludes with a review of key threats and some real-world case studies that show how different security controls can be used to defend enterprises from similar attacks.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Kevin L. Jackson
    Kevin L. Jackson
    Instructor's Courses
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 35
    • duration 1:46:19
    • English subtitles has
    • Release Date 2024/02/10