Cloud Security Considerations for Government and the Military
Offered By: LinkedIn Learning
Course Description
Overview
Explore cloud security considerations unique to the government and military, including data protection, privacy, risk, and compliance requirements around the world.
Syllabus
Introduction
- Protect government and military data
- What you should know
- Security considerations for the government and military industries
- Key cloud computing drivers
- Cloud computing characteristics
- Deployment models
- Service models
- IT implementation options
- Infrastructure attack vectors
- Software attack vectors
- Critical vulnerabilities
- Examine security requirements
- Cyber threats to government
- CISO expectations in government
- Geographic impact
- Data protection and privacy requirements
- Data and privacy in Australia
- Data and privacy in China
- Data and privacy in Japan
- Data and privacy in India
- Data and privacy in Russia
- Data and privacy in Switzerland
- Data and privacy in Germany
- Data and privacy in the UK
- Data and privacy in Brazil
- Data and privacy in the United States
- Data and privacy in the Middle East and Africa
- Examine risk and compliance requirements
- Risk and compliance requirements in Oceania
- Risk and compliance requirements in Europe
- Risk and compliance requirements in the Americas
- Treacherous 12
- Government relevant case study #2
- Government relevant case study #1
- Next steps
Taught by
Kevin L. Jackson
Related Courses
Cryptography IIStanford University via Coursera Microsoft Enterprise Mobility Suite
Microsoft via edX Social Media - What No One has Told You about Privacy
openHPI Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX