From the course: Cloud Security Considerations for Government and the Military

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

- [Kevin Jackson] This brings us the end of the cloud computing data protection and privacy in this public sector course. It's been my pleasure to guide you for the start of this journey. As you move forward on your own, don't repeat the previous mistakes highlighted in these three use cases. Leverage freely available resources like the Cloud Controls Matrix, the Treacherous 12 study and the Treacherous 12 Case Studies. Please discuss what you've learned here with your own team members. And above all, keep learning. Some of my suggestions for your next course are Creating a Culture of Privacy, Understanding and Prioritizing Data Privacy, or Learning Threat Modeling for Security Professionals.

Contents