Cloud Security Considerations for Government and the Military

Cloud Security Considerations for Government and the Military
Cloud Security Considerations for Government and the Military
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 42m | 199 MB

Is your governmental organization exploring a move to cloud computing? In this course, explore cloud security considerations specific to your industry, as well as how to effectively cope with these challenges. Instructor Kevin L. Jackson covers key resource requirements, security breaches, relevant security frameworks, and cyber defense priorities. He provides regional breakdowns, exploring security requirements broken down by territory: Asia, the Middle East, Europe, Oceania, Africa, and the Americas. Plus, he explores relevant case studies that highlight key threats and controls in government cloud security.

Topics include:

  • The essential characteristics of cloud computing
  • IT implementation options
  • Unique cyber threats to the government sector
  • CISO expectations in government
  • Regional data protection and privacy requirements
  • Examining risk and compliance requirements
Table of Contents

1 Protect government and military data
2 What you should know
3 Security considerations for the government and military industries
4 Key cloud computing drivers
5 Cloud computing characteristics
6 Deployment models
7 Service models
8 IT implementation options
9 Infrastructure attack vectors
10 Software attack vectors
11 Critical vulnerabilities
12 Examine security requirements
13 Cyber threats to government
14 CISO expectations in government
15 Geographic impact
16 Data protection and privacy requirements
17 Data and privacy in Australia
18 Data and privacy in China
19 Data and privacy in Japan
20 Data and privacy in India
21 Data and privacy in Russia
22 Data and privacy in Switzerland
23 Data and privacy in Germany
24 Data and privacy in the UK
25 Data and privacy in Brazil
26 Data and privacy in the United States
27 Data and privacy in the Middle East and Africa
28 Examine risk and compliance requirements
29 Risk and compliance requirements in Oceania
30 Risk and compliance requirements in Europe
31 Risk and compliance requirements in the Americas
32 Treacherous 12
33 Government relevant case study #2
34 Government relevant case study #1
35 Next steps