15. Cloud Security Considerations
This course on Information Security has 22 video modules. Here is a link to the entire playlist... https://youtube.com/playlist?list=PLzWG2rk2M4Y5IzSKOE2ZcQU1lYdFAQarF
1. Introduction to Information Security
2a. Healthcare and Other Federal Regulations
2b. Physical Security for Information Security
3. Logical Security Access Control for Information Security
4. Network Fundamentals
5. Network Security
5a. CISCO NFP (Network Framework Protection) and AutoSecure
6. Wireless Security
7. Cryptography (Encryption, etc)
7a. IPsec Framework, VPN, and OSI-7 (OSI Layer 7)
8. Application, Data and Host Security
8a. Security Code Scan: Real-time, Static, and Dynamic
9. Malware, Vulnerabilities and Threats
10. Operations and Methods for Information Security
10a. Operations - Info Security Awareness Training
11. Planning, Incident Mgt & BCRP for Information Security
12. Information Security Forensics
13. Quantum Computing & Cryptography
14. IBM Artificial Intelligence & Cybersecurity
15. Cloud Security Considerations
15a. Wireshark Demo
15b. ZenMap (Nmap) Demo
-
36:32
AllHackingCons
1 year agoSecure Development Considerations for Cloud Virtual Environments with Andrew Murren
-
10:48
excelsoftware
3 years agoCloud Sharing
38 -
40:34
AllHackingCons
1 year agoSecure Configuration in the Cloud
-
3:48
gmsytaislam
1 year agoCloud Service
9 -
44:42
AllHackingCons
1 year agoCloud Access Security Broker 6 Steps To Addressing Your Cloud Risks Matt Bianco
-
50:14
TechSource
3 years agoCloud Work Spaces: What You Need to Know
27 -
4:47
AllHackingCons
1 year agoCXO Key Considerations for Securing Your Cloud Environment by Raphaël Peyret
-
26:27
Tech One, Two Podcast
1 year agoThe Cloud and How Your Business Can Benefit from It
-
1:51:50
infosectrain01
1 year agoCloud storage security | Cloud Networking Security | Introduction to AWS infrastructure
353 -
2:12
omdesertcart
1 year agoRole of Cloud Computing in Todays Business Scenario
4