

Video Training → Biometrics Security and Privacy Considerations
Published by: voska89 on 15-03-2024, 04:40 |
0

Free Download Biometrics Security and Privacy Considerations
Released 2/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 41m | Size: 103 MB
Biometrics has been around for decades, but it's currently having a moment, as an explosion of real-world use cases delivers the promise of greater security, possibly at the expense of individual privacy. This course delves into the fundamentals of biometric security and the challenges of meeting privacy requirements. Learn how to identify biometric use cases that meet business needs and get a clear definition of the underlying technologies that drive it. Instructor Lyron Andrews provides an overview of biometric security tools such as iris, fingerprint, and facial recognition technology, showing you how society is impacted by legal and ethical concerns and data privacy considerations.
Video Training → Cloud Security Considerations for General Industry
Published by: voska89 on 25-12-2023, 12:47 |
0

Free Download Cloud Security Considerations for General Industry
Duration: 1h 46m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 187 MB
Level: Intermediate | Genre: eLearning | Language: English
Is your business looking to make a move to cloud computing? In this course, instructor Kevin L. Jackson explores the cybersecurity challenges impacting businesses in non-highly regulated industries. Kevin explores the cloud security requirements specific to general industry, broken down by region: Asia, the Middle East, Europe, Oceania, Africa, and the Americas. He provides a preliminary overview of cloud computing and its vulnerabilities, as well as the general business approach to cybersecurity. He then provides regional breakdowns, exploring security requirements for each area. The course concludes with a review of key threats and some real-world case studies that show how different security controls can be used to defend enterprises from similar attacks.
Homepage

