Analyzing Weak Areas of the Federal Cloud Security Program
Offered By: YouTube
Course Description
Overview
Explore the weaknesses in the Federal Cloud Security Program through this insightful 54-minute conference talk from DerbyCon 4. Delve into the intricacies of FedRAMP, including its categories and purpose, while examining the 2013 IRS audit. Gain a comprehensive understanding of crucial aspects such as accountability, security measures, system boundaries, and the Critical 28 List. Investigate system interconnection, data collection practices, penetration testing methodologies, and internal threat assessment. Conclude with an examination of continuous monitoring strategies to enhance federal cloud security.
Syllabus
Intro
What is FedRAMP
Categories of FedRAMP
Why FedRAMP
The IRS
IRS 2013 Audit
Accountability
Security
System Boundary
Critical 28 List
System Interconnection
Data Collection
Penetration Test
Internal Threat
Continuous Monitoring
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent