Certified Cloud Security Professional
(CCSP-2018) / ISBN : 978-1-64459-027-0
About This Course
Get certified for the (ISC)² CCSP certification with the Certified Cloud Security Professional course and lab. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The CCSP training course provides skills for all the CCSP exam topics and expertise in areas such as cloud concepts, architecture and design, cloud data security, cloud platform and infrastructure security, cloud application security, cloud security operations.
Skills You’ll Get
The (ISC)² CCSP certification is a vendor-neutral, globally-acknowledged credential in the field of cloud security. The CCSP certification exam validates the advanced technical skills and ability to design, manage, and secure data, applications, and infrastructure in the cloud. The (ISC)² CCSP certification represents the highest standard for Cloud security and provides step by step guidance and easy-to-follow detailed explanations on every part of CCSP certification.
Interactive Lessons
12+ Interactive Lessons | 81+ Exercises | 225+ Quizzes | 100+ Flashcards | 100+ Glossary of terms
Gamified TestPrep
125+ Pre Assessment Questions | 2+ Full Length Tests | 123+ Post Assessment Questions | 171+ Practice Test Questions
Hands-On Labs
31+ LiveLab | 21+ Video tutorials | 41+ Minutes
Introduction
- Overview of the CCSP Exam
- Notes on This Course's Organization
Architectural Concepts
- Business Requirements
- Cloud Evolution, Vernacular, and Definitions
- Cloud Computing Roles and Responsibilities
- Cloud Computing Definitions
- Foundational Concepts of Cloud Computing
- Summary
- Exam Essentials
- Written Labs
Design Requirements
- Business Requirements Analysis
- Boundaries of Cloud Models
- Design Principles for Protecting Sensitive Data
- Summary
- Exam Essentials
- Written Labs
Data Classification
- Data Inventory and Discovery
- Jurisdictional Requirements
- Data Rights Management
- Data Control
- Summary
- Exam Essentials
- Written Labs
Cloud Data Security
- Cloud Data Life Cycle
- Cloud Storage Architectures
- Cloud Data Security Foundational Strategies
- Summary
- Exam Essentials
- Written Labs
Security in the Cloud
- Shared Cloud Platform Risks and Responsibilities
- Cloud Computing Risks by Deployment and Service Model
- Virtualization
- Cloud Attack Surface
- Disaster Recovery (DR) and Business Continuity Management (BCM)
- Summary
- Exam Essentials
- Written Labs
Responsibilities in the Cloud
- Foundations of Managed Services
- Business Requirements
- Shared Responsibilities by Service Type
- Shared Administration of OS, Middleware, or Applications
- Share Responsibilities: Data Access
- Lack of Physical Access
- Summary
- Exam Essentials
- Written Labs
Cloud Application Security
- Training and Awareness
- Cloud-Secure Software Development Life Cycle (SDLC)
- ISO/IEC 27034-1 Standards for Secure Application Development
- Identity and Access Management (IAM)
- Cloud Application Architecture
- Cloud Application Assurance and Validation
- Summary
- Exam Essentials
- Written Labs
Operations Elements
- Physical/Logical Operations
- Security Training and Awareness
- Basic Operational Application Security
- Summary
- Exam Essentials
- Written Labs
Operations Management
- Monitoring, Capacity, and Maintenance
- Change and Configuration Management (CM)
- Business Continuity and Disaster Recovery (BC/DR)
- Summary
- Exam Essentials
- Written Labs
Legal and Compliance Part 1
- Legal Requirements and Unique Risks in the Cloud Environment
- Potential Personal and Data Privacy Issues in the Cloud Environment
- Audit Processes, Methodologies, and Cloud Adaptations
- Summary
- Exam Essentials
- Written Labs
Legal and Compliance Part 2
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Business Requirements
- Cloud Contract Design and Management for Outsourcing
- Identifying Appropriate Supply Chain and Vendor Management Processes
- Summary
- Exam Essentials
- Written Labs
Architectural Concepts
- Capturing Network Traffic
- Installing Ubuntu Using Hyper-V Manager
- Using a Symmetric Algorithm
- Using an Asymmetric Algorithm
Design Requirements
- Performing Active Scanning using Nmap
- Creating a DMZ Zone
Data Classification
- Displaying Metadata Information
- Enabling Access Control List
- Standard Access Control List
- Extended Access Control List
Cloud Data Security
- Building IPSec VPN using ubuntu
- Generating a Symmetric key
- Generating an Asymmetric key
- Observe an MD5-Generated Hash Value
- Observe an SHA-Generated Hash Value
Security in the Cloud
- Performing DoS Attacks with SYN Flood
- Performing a MITM Attack
- Using Social Engineering to Plan an Attack
Responsibilities in the Cloud
- Setup Honeypot on Kali Linux
- Enabling an Intrustion Detection Policy
- Removing Unnecessary Services
Cloud Application Security
- Authorization of an User
- Examining File Permissions
- Cross-site request forgery with low complexity
- Reviewing the Top 10 OWASP Attacks
- Attacking a website using XSS injection
- Conducting IP Spoofing
Operations Management
- Verify RAM Usage
- Checking Disk Capacity
- Using MBSA
Legal and Compliance Part 1
- Complete Chain of Custody
Why Do Learners Love This Course?
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us Now