Course Details
Developing and Deploying Effective Cloud Cyber Security Best Practices For Your Organization
Course ID#: 458 | Short Title: Cyber Security Best Practices | Category: Security
Course Description
Protecting your organization from cyber threats is paramount in today’s business environment. There are countless ways that your data can be compromised and the industry’s best practices are ever-changing to adapt to the latest threats. Increasingly more professionals are working remotely and Cloud technology is what is connecting us all. It is business-critical that our organizations have correct and relevant security settings and procedures. Permissive security and privacy controls for Microsoft 365, Microsoft Azure, Amazon Web Services, or Google could pose a major security risk to the organization.
This course looks at practical approaches to managing the security and privacy settings of today’s major Cloud tools. It will give specific and direct advice on best practices for configuration and settings for today’s major Cloud platforms to promote better security. Specific attention will be paid to the major Cloud business platforms including, Microsoft, Google, Amazon, and Zoho. We will review everything from the importance of multi-factor authentication, to user levels/permissions, to methods to quickly identify when a user’s account might be compromised. Business professionals will leave the class with specific insight on how they can protect their organization’s cloud data.
Major Topics
- Implementing Security Policies in Your Organization
- Overall Security Recommendations
- Data & Privacy Regulations
Learning Objectives
- Identify the location of the security and privacy settings for the major cloud providers such as Microsoft, Amazon, Google, and Zoho. Determine which security and privacy features are relevant to your organization and their optimum settings.
- Develop a training plan to increase the knowledge and awareness of the importance of security and privacy to an organization’s staff and stakeholders.
- List, determine, and implement major security technologies such as multifactor authentication, data loss prevention, access control lists, and more to improve the protection of an organization’s cloud data.
- Implement better internal controls using tools such as Microsoft’s Security and Compliance center or Amazon’s Identity and Access Management to reduce the risk of a data breach.
- Recognize the importance and impact of privacy frameworks such as GDPR or CCPA on business today. Implement better security inside your Cloud tools to promote better compliance with these and other major privacy frameworks.
Course Specifics
Level |
Advanced Preparation |
Prerequisites |
Recommended Duration |
---|---|---|---|
Basic | None | None | 100 Minutes |
CPE Credit Recommendations
Primary
|
Primary
|
Secondary
|
Secondary
|
---|---|---|---|
Information Technology | 2 | Not Applicable | Not Applicable |
Created and Updated Dates
Creation Year |
Update Year |
Update Date |
---|---|---|
2022 | 2023 | 02/01/24 |
© Copyright 2024 Stephen M. Yoss. All Rights Reserved.
No part of these CPE courses may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the author, except for noncommercial uses permitted by copyright law. For more information about this course or any other of Stephen’s content, please visit https://yoss.io