Price: $ 10.00 USD | Size: 4.59 GB | Duration : 17.25+ Hours | 125+ Video Lessons
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
HOW TO DOWNLOAD THIS COURSE?
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links. You can Download This Course immediately from that Links.
(ISC)2 CCSP - Certified Cloud Security Professional - (ISC) Certification Training
Content
001. Cloud Computing Roles
002. Cloud Computing Characteristics
003. Cloud Deployment Models
004. Infrastructure as a Service (IaaS)
005. Platform as a Service (PaaS)
006. Software as a Service (SaaS)
007. Shared Responsibility
008. Impact From Emerging Technologies
009. Cryptography and Key Management
010. Access Control with IAM
011. Data and Media Sanitization
012. Network and Virtualization Security
013. Common Threats in the Cloud
014. Cloud Secure Data Lifecycle
015. Data Governance
016. Cloud Based DR and BC
017. Cost Benefit Analysis
018. Functional Requirements
019. Security Considerations for Different Cloud Categories
020. Evaluating Cloud Service Providers
021. ISOIEC 27017
022. PCI-DSS
023. ENISA
024. CSA STAR
025. Additional Standards
026. Cloud Data Lifecycle
027. Data Functions
028. Data Dispersion
029. Cloud Storage Types
030. Threats to Storage
031. The Encryption Process and the Cloud
032. IaaS Data Encryption Options
033. Key Management
034. Data Hashing - (ISC)² CCSP
035. Data Obfuscation and Anonymization
036. Data Loss Prevention (DLP)
037. Data Discovery -
038. Data Discovery Techniques and Issues
039. Data Classification
040. Information Rights Management (IRM)
041. Data Retention and Deletion
042. Data Archival
043. Logs and Auditability
044. Log Storage
045. Chain of Custody and Non-Repudiation
046. Intro
047. Physical Environment
048. Networking and Communications
049. Compute and Storage
050. Virtualization
051. Management Plane
052. Intro
053. Datacenter Services
054. Datacenter Security
055. Physical Design
056. Temperature and Humidity
057. The Importance of Airflow
058. Multi-Vendor Pathway Connectivity
059. Risk Assessments
060. Cloud Infrastructure Risk and Security
061. Cloud Specific Risks
062. Virtualization Risks
063. Countermeasure Strategies
064. Physical and Environmental Protection
065. System and Communication Protection
066. Protecting Virtualized Systems
067. Identification, Authentication and Authorization
068. Audit Mechanisms
069. Risks Related to the Cloud and BCDR
070. Business Requirements for BCDR
071. BCDR Strategy and Planning
072. BCDR Testing
073. Business Requirements
074. Phases of the SDLC
075. Development Methodologies
076. Cloud Specific Risks
077. Threat Modeling
078. Secure Coding Techniques
079. Intro
080. Common Cloud Application Vulnerabilities
081. Cloud Development Basics
082. Functional and Non-Functional Testing
083. Security Testing Methodologies
084. Quality Assurance
085. Abuse Case Testing
086. Supplemental Security Components
087. Cryptography and Applications
088. Application Virtualization and Orchestration
089. Federated Identity, MFA, OTP and SSO
090. CASB and Secrets Management
091. Hardware Specific Security Configurations
092. Security Configurations
093. Virtualization Toolset
094. Controlling Access
095. Securing the Network
096. Operating System Security
097. Stand Alone Hosts in the Cloud
098. Managing It All
099. Backups and Availability
100. Operational Controls and Standards
101. Supporting Digital Forensics
102. Managing Communications
103. Managing Security Operations
104. Intro to Legal, Risk and Privacy in the Cloud
105. Legal Requirements and Unique Risks in the Cloud
106. Legal Frameworks and Guidelines
107. E-Discovery and Forensic Requirements
108. Contractual vs Regulated Private Data
109. Country-Specific Legislation of Data Privacy
110. Privacy Standards and PIAs
111. Skill Review
112. Intro Auditing in the Cloud
113. Audit Controls and Assurance
114. Audit Reports
115. Gap Analysis and Audit Planning
116. ISMS and ISCS
117. Policies
118. identification and Involvement of Relevant Stakeholders
119. Specialized Compliance Requirements
120. Impact of a Distributed IT Model
121. Assessing Risk Management and Data Roles
122. Regulatory Transparency and Risk Treatment
123. Risk Frameworks, Metrics and Environments
124. Business Requirements and Vendor Management
125. Contract Management
126. Supply Chain Management
(ISC)2 CCSP - Certified Cloud Security Professional
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links
You can Download This Course immediately from the click that Links