وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cloud Security Considerations for General Industry

سرفصل های دوره

Is your business looking to make a move to cloud computing? In this course, instructor Kevin L. Jackson explores the cybersecurity challenges impacting businesses in non-highly regulated industries. Kevin explores the cloud security requirements specific to general industry, broken down by region: Asia, the Middle East, Europe, Oceania, Africa, and the Americas. He provides a preliminary overview of cloud computing and its vulnerabilities, as well as the general business approach to cybersecurity. He then provides regional breakdowns, exploring security requirements for each area. The course concludes with a review of key threats and some real-world case studies that show how different security controls can be used to defend enterprises from similar attacks.


01 - Introduction
  • 01 - Protect general business data
  • 02 - What you should know
  • 03 - Security considerations for general business

  • 02 - 1. Cloud Computing Overview
  • 01 - Cloud computing key drivers
  • 02 - Cloud computing characteristics
  • 03 - Deployment models
  • 04 - Service models
  • 05 - IT implementation options
  • 06 - Infrastructure attack vectors
  • 07 - Software attack vectors
  • 08 - Critical vulnerabilities

  • 03 - 2. General Business Approach to Cybersecurity
  • 01 - Examine security requirements within general business
  • 02 - Cyber threats to general business
  • 03 - Cyber organizations in general business

  • 04 - 3. Regional Data Protection and Privacy Requirements
  • 01 - Geographic impact
  • 02 - Data protection and privacy requirements
  • 03 - Data and privacy in Australia
  • 04 - Data and privacy in China
  • 05 - Data and privacy in Japan
  • 06 - Data and privacy in India
  • 07 - Data and privacy in Russia
  • 08 - Data and privacy in Switzerland
  • 09 - Data and privacy in Germany
  • 10 - Data and privacy in the UK
  • 11 - Data and privacy in Brazil
  • 12 - Data and privacy in the United States
  • 13 - Data and privacy in the Middle East and Africa

  • 05 - 4. Regional Risk and Compliance Requirements
  • 01 - Examine risk and compliance requirements
  • 02 - Risk and compliance requirements in Asia
  • 03 - Risk and compliance requirements in Europe
  • 04 - Risk and compliance requirements in the Americas

  • 06 - 5. Key Threats and Controls in Financial Cloud Security
  • 01 - Treacherous 12
  • 02 - Case Study Dirty COW
  • 03 - Case Study Net Traveler

  • 07 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30443
    حجم: 188 مگابایت
    مدت زمان: 107 دقیقه
    تاریخ انتشار: 2 اسفند 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید