The Cloud and Business

The cloud has become a vital component for business as technology becomes embedded in modern life. Every leader needs to understand the cloud and how it operates, as well as the potential dangers and pitfalls associated with cloud computing. Knowledgeable monitoring and maintenance can be the difference between the success and failure of the technology’s use.

Research has consistently demonstrated that when clear goals are associated with learning, it occurs more easily and rapidly. At the end of this course, you should be able to:

  • Understand what the cloud is
  • Recognize risks and benefits
  • Communicate effectively
  • Employ business processes
  • Monitor performance

The Cloud

  • History
  • Current Uses
  • Trends
  • Case Study
  • Assessment

Models for Business

  • Software as a Service
  • Platform as a Service
  • Infrastructure as a Service
  • Other Options
  • Case Study
  • Assessment

Advantages

  • Data Center Finances
  • Labor Finances
  • Productivity
  • Ease of Use
  • Case Study
  • Assessment

Address Risks

  • Assessment
  • Prioritize Concerns
  • Address Risks
  • Focus on Success
  • Case Study
  • Assessment

Security

  • Understand Weaknesses
  • Breaches
  • Identity Management
  • Strategies
  • Case Study
  • Assessment

Device Management

  • Devices that Can Connect
  • Desktops
  • Benefits
  • Monitoring
  • Case Study
  • Assessment

Service Oriented Architecture

  • Definition
  • With the Cloud
  • Services
  • Benefits to the Business
  • Case Study
  • Assessment

Business Processes

  • Scale Applications
  • Web-based
  • Examples
  • Predictions
  • Case Study
  • Assessment

Standards

  • Best Practices
  • Organizational Standards
  • Standards in the Cloud
  • Interoperability and Integration
  • Case Study
  • Assessment

Introduction to Cyber Security

Every organization is responsible for ensuring cyber security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.

Research has consistently demonstrated that when clear goals are associated with learning, it occurs more easily and rapidly. At the end of this course, you should be able to:

  • Understand different types of malware and security breaches
  • Know the types of cyber attacks to look out for
  • Develop effective prevention methods

Cyber security Fundamentals

  • What is Cyberspace?
  • What is Cyber Security?
  • Why is Cyber Security Important?
  • What is a Hacker?
  • Case Study
  • Assessment

Types of Malware

  • Worms
  • Viruses
  • Spyware
  • Trojans
  • Case Study
  • Assessment

Cyber Security Breaches

  • Phishing
  • Identity Theft
  • Harassment
  • Cyber Stalking
  • Case Study
  • Assessment
  • Types of Cyber Attacks
  • Password Attacks
  • Denial of Service Attacks
  • Passive Attack
  • Penetration Testing
  • Case Study
  • Assessment

Prevention Tips

  • Craft a Strong Password
  • Two-Step Verification
  • Download Attachments with Care
  • Question Legitimacy of Websites
  • Case Study
  • Assessment

Mobile Protection

  • No Credit Card Numbers
  • Place Lock on Phone
  • Don’t Save Passwords
  • No Personalized Contacts Listed
  • Case Study
  • Assessment

Social Network Security

  • Don’t Reveal Location
  • Keep Birthdate Hidden
  • Have Private Profile
  • Don’t Link Accounts
  • Case Study
  • Assessment

Prevention Software

  • Firewalls
  • Virtual Private Networks
  • Anti-Virus & Anti-Spyware
  • Routine Updates
  • Case Study
  • Assessment

Critical Cyber Threats

  • Critical Cyber Threats
  • Cyber Terrorism
  • Cyber Warfare
  • Cyber Espionage
  • Case Study
  • Assessment