Companies Home Search Profile

Cloud Security for Financial Services

Focused View

Emmanuel Chebukati

2:00:08

0 View
  • 01 - Essentials for securing financial services solutions.mp4
    00:46
  • 02 - What you should know.mp4
    00:45
  • 03 - Regulatory implications for securing financial services.mp4
    02:01
  • 01 - Set up an ideal cloud architecture for financial services.mp4
    06:46
  • 02 - Configure site-to-site VPNs for secure partner integrations.mp4
    06:12
  • 03 - Configure remote access VPNs for secure administration.mp4
    07:05
  • 01 - Deploy managed databases for simpler database security.mp4
    07:06
  • 02 - Use real-time replication for backup and redundancy.mp4
    08:34
  • 03 - Set up object storage as a secure document repository.mp4
    08:34
  • 01 - Deploy a web application firewall to prevent common attacks.mp4
    07:36
  • 02 - Identify application integrity issues with error monitoring.mp4
    04:40
  • 03 - Use managed API tools to securely expose services.mp4
    06:49
  • 01 - Manage application secrets and keys appropriately.mp4
    05:38
  • 02 - Scale applications to accomodate changes in traffic.mp4
    08:31
  • 03 - Automate security patching.mp4
    08:07
  • 04 - Monitor your infrastructure and react to threats.mp4
    04:32
  • 01 - Configure fraud detection to prevent financial fraud.mp4
    10:42
  • 02 - Implement data loss prevention to curb corporate espionage.mp4
    06:30
  • 01 - Final checks Cleaning up resources.mp4
    08:00
  • 02 - Next steps.mp4
    01:14
  • Description


    Financial services today are increasingly enabled by cloud technologies, and this trend isn’t likely to change. That means that if you’re an IT or security professional, the need to secure financial services is becoming more important in your role every day. In this course, instructor Emmanuel Chebukati covers the essential skills that fintech providers and IT pros need to consider to protect their networks, applications, and customer data. Get hands-on practical experience in a simulated hybrid cloud environment of a typical financial firm, using it to build out network infrastructure, storage capabilities, and application security layers, and ultimately developing a baseline cloud security posture that you can apply to organizations in the real world. By the end of this course, you’ll be ready to review your firm’s own cloud security posture and make recommendations for improvement and future growth.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Emmanuel Chebukati
    Emmanuel Chebukati
    Instructor's Courses
    Emmanuel is a cloud security engineer with 7+ years of experience in systems auditing, application security, and secure cloud deployment. He has delivered sensitive technology projects across the East African region and globally (remotely) in the public and private sectors. Emmanuel's industry experience is backed by three Microsoft Azure certifications. He is also an AWS Certified Cloud Practitioner, a Certified Ethical Hacker, and he holds an MSc in information technology from Carnegie Mellon. Additionally, Emmanuel teaches cloud engineering and cyber security educational content by delivering live boot camps and recording online courses. He is currently working on scaling Hepta Analytics – a data analytics company he co-founded – and HeptaPay – it's fintech subsidiary – in Kenya and Rwanda.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 20
    • duration 2:00:08
    • English subtitles has
    • Release Date 2024/12/06

    Courses related to Network Security