(ISC)2 Certified Cloud Security Professional (CCSP)
(CCSP.AE2)
/ ISBN: 978-1-64459-407-0
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
(ISC)2 Certified Cloud Security Professional (CCSP)
Lessons
-
11+ Lessons
-
652+ Exercises
-
200+ Quizzes
-
364+ Flashcards
-
251+ Glossary of terms
TestPrep
-
150+ Pre Assessment Questions
-
2+ Full Length Tests
-
150+ Post Assessment Questions
-
300+ Practice Test Questions
LiveLab
-
25+ LiveLab
-
25+ Video tutorials
-
01:01+ Hours
- CCSP Certification
- Taking the CCSP Exam
- Computer-Based Testing Environment
- Exam Retake Policy
- Work Experience Requirement
- Recertification Requirements
- What Does This Course Cover?
- CCSP Exam Objectives
- CCSP Certification Exam Objective Map
- Cloud Characteristics
- Business Requirements
- Cloud Computing Service Categories
- Cloud Deployment Models
- Multitenancy
- Cloud Computing Roles and Responsibilities
- Cloud Computing Reference Architecture
- Virtualization
- Cloud Shared Considerations
- Emerging Technologies
- Summary
- Exam Essentials
- Data Inventory and Discovery
- Information Rights Management
- Data Control
- Summary
- Exam Essentials
- Cloud Data Lifecycle
- Cloud Storage Architectures
- Threats to Cloud Storage
- Designing and Applying Security Strategies for Storage
- Summary
- Exam Essentials
- Shared Cloud Platform Risks and Responsibilities
- Cloud Computing Risks by Deployment Model
- Cloud Computing Risks by Service Model
- Virtualization
- Disaster Recovery (DR) and Business Continuity (BC)
- Cloud Design Patterns
- Summary
- Exam Essentials
- Foundations of Managed Services
- Shared Responsibilities by Service Type
- Securing Communications and Infrastructure
- Securing Hardware and Compute
- Securing Software
- Managing Virtual Systems
- Assessing Vulnerabilities
- Securing the Management Plane
- Auditing Your Environment and Provider
- Summary
- Exam Essentials
- Developing Software for the Cloud
- Cloud Application Architecture
- Cloud-Secure Software Development Lifecycle (SDLC)
- Cloud Application Assurance and Validation
- Identity and Access Management
- Summary
- Exam Essentials
- Designing a Secure Data Center
- Managing Security Operations
- Summary
- Exam Essentials
- Monitoring, Capacity, and Maintenance
- Change and Configuration Management
- Problem and Incident Management
- IT Service Management and Continual Service Improvement
- Business Continuity and Disaster Recovery
- Summary
- Exam Essentials
- Legal Requirements and Unique Risks in the Cloud Environment
- Analyzing a Law
- Legal Liability
- Torts and Negligence
- U.S. Privacy and Security Laws
- International Laws
- Laws, Regulations, and Standards
- Information Security Management Systems
- Privacy in the Cloud
- Cloud Forensics
- Audit Processes, Methodologies, and Cloud Adaptations
- Summary
- Exam Essentials
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Security Policy Framework
- Enterprise Risk Management
- Risk Treatment and Response
- Risk Analysis
- Cloud Contract Design
- Government Cloud Standards
- Manage Communication with Relevant Parties
- Summary
- Exam Essentials
Hands on Activities (Live Labs)
- Creating a Virtual Machine
- Displaying Metadata Information
- Capturing Network Traffic
- Taking an Incremental Backup
- Taking a Full Backup
- Creating an Amazon S3 Glacier Vault
- Observing an MD5-Generated Hash Value
- Observing an SHA256-Generated Hash Value
- Creating a CloudWatch Dashboard and Adding a Metric to it
- Performing a MITM Attack
- Using Social Engineering Techniques to Plan an Attack
- Configuring a Firewall for Inbound Rules
- Setting up a Honeypot on Kali Linux
- Enabling an Access Control List
- Creating a VPC
- Creating a Network ACL
- Configuring Outbound Rules for a Firewall
- Creating an Elastic Load Balancer
- Creating a NAT Gateway
- Configuring a Proxy Server
- Conducting IP Spoofing
- Conducting Cross-site Request Forgery (CSRF or XSRF) Attacks
- Attacking a Website Using Cross-Site Scripting (XSS) Injection
- Completing the Chain of Custody
- Simulating the DDoS Attack
×