YoVDO

Cloud Security Considerations for the Healthcare Industry

Offered By: LinkedIn Learning

Tags

Cloud Computing Courses Cybersecurity Courses Cloud Security Courses Healthcare Industry Courses

Course Description

Overview

Get a region-by-region breakdown of the data protection and privacy laws and unique cybersecurity challenges facing the healthcare industry.

Syllabus

Introduction
  • Protecting healthcare data
  • What you should know
  • Security for the healthcare industry
1. Cloud Computing Overview
  • Key cloud-computing drivers
  • Cloud-computing characteristics
  • Deployment models
  • Service models
  • IT implementation options
  • Infrastructure attack vectors
  • Software attack vectors
  • Critical vulnerabilities
2. Healthcare Industry's Approach to Cybersecurity
  • Examine security requirements
  • Cyber threats to healthcare
  • Cyber organizations in healthcare
3. Regional Data Protection and Privacy Requirements
  • Geographic impact
  • Data protection and privacy requirements
  • Data and privacy in Australia
  • Data and privacy in China
  • Data and privacy in Japan
  • Data and privacy in India
  • Data and privacy in Russia
  • Data and privacy in Switzerland
  • Data and privacy in Germany
  • Data and privacy in the UK
  • Data and privacy in Brazil
  • Data and privacy in the United States
  • Data and privacy in the Middle East and Africa
4. Regional Risk and Compliance Requirements
  • Examining risk and compliance requirements
  • Risk and compliance requirements in Oceania and Asia
  • Risk and compliance requirements in Europe and Americas
5. Key Threats and Controls in Healthcare Cloud Security
  • Treacherous 12
  • Case Study: LinkedIn
  • Case Study: MongoDB
  • Case Study: Zynga
Conclusion
  • Next steps

Taught by

Kevin L. Jackson

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera