Certified Cloud Security Professional
(CCSP-2018) / ISBN : 978-1-64459-027-0
About This Course
Skills You’ll Get
Interactive Lessons
12+ Interactive Lessons | 81+ Exercises | 225+ Quizzes | 100+ Flashcards | 100+ Glossary of terms
Gamified TestPrep
125+ Pre Assessment Questions | 2+ Full Length Tests | 123+ Post Assessment Questions | 171+ Practice Test Questions
Hands-On Labs
31+ LiveLab | 21+ Video tutorials | 41+ Minutes
Introduction
- Overview of the CCSP Exam
- Notes on This Course's Organization
Architectural Concepts
- Business Requirements
- Cloud Evolution, Vernacular, and Definitions
- Cloud Computing Roles and Responsibilities
- Cloud Computing Definitions
- Foundational Concepts of Cloud Computing
- Summary
- Exam Essentials
- Written Labs
Design Requirements
- Business Requirements Analysis
- Boundaries of Cloud Models
- Design Principles for Protecting Sensitive Data
- Summary
- Exam Essentials
- Written Labs
Data Classification
- Data Inventory and Discovery
- Jurisdictional Requirements
- Data Rights Management
- Data Control
- Summary
- Exam Essentials
- Written Labs
Cloud Data Security
- Cloud Data Life Cycle
- Cloud Storage Architectures
- Cloud Data Security Foundational Strategies
- Summary
- Exam Essentials
- Written Labs
Security in the Cloud
- Shared Cloud Platform Risks and Responsibilities
- Cloud Computing Risks by Deployment and Service Model
- Virtualization
- Cloud Attack Surface
- Disaster Recovery (DR) and Business Continuity Management (BCM)
- Summary
- Exam Essentials
- Written Labs
Responsibilities in the Cloud
- Foundations of Managed Services
- Business Requirements
- Shared Responsibilities by Service Type
- Shared Administration of OS, Middleware, or Applications
- Share Responsibilities: Data Access
- Lack of Physical Access
- Summary
- Exam Essentials
- Written Labs
Cloud Application Security
- Training and Awareness
- Cloud-Secure Software Development Life Cycle (SDLC)
- ISO/IEC 27034-1 Standards for Secure Application Development
- Identity and Access Management (IAM)
- Cloud Application Architecture
- Cloud Application Assurance and Validation
- Summary
- Exam Essentials
- Written Labs
Operations Elements
- Physical/Logical Operations
- Security Training and Awareness
- Basic Operational Application Security
- Summary
- Exam Essentials
- Written Labs
Operations Management
- Monitoring, Capacity, and Maintenance
- Change and Configuration Management (CM)
- Business Continuity and Disaster Recovery (BC/DR)
- Summary
- Exam Essentials
- Written Labs
Legal and Compliance Part 1
- Legal Requirements and Unique Risks in the Cloud Environment
- Potential Personal and Data Privacy Issues in the Cloud Environment
- Audit Processes, Methodologies, and Cloud Adaptations
- Summary
- Exam Essentials
- Written Labs
Legal and Compliance Part 2
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Business Requirements
- Cloud Contract Design and Management for Outsourcing
- Identifying Appropriate Supply Chain and Vendor Management Processes
- Summary
- Exam Essentials
- Written Labs
Architectural Concepts
- Capturing Network Traffic
- Installing Ubuntu Using Hyper-V Manager
- Using a Symmetric Algorithm
- Using an Asymmetric Algorithm
Design Requirements
- Performing Active Scanning using Nmap
- Creating a DMZ Zone
Data Classification
- Displaying Metadata Information
- Enabling Access Control List
- Standard Access Control List
- Extended Access Control List
Cloud Data Security
- Building IPSec VPN using ubuntu
- Generating a Symmetric key
- Generating an Asymmetric key
- Observe an MD5-Generated Hash Value
- Observe an SHA-Generated Hash Value
Security in the Cloud
- Performing DoS Attacks with SYN Flood
- Performing a MITM Attack
- Using Social Engineering to Plan an Attack
Responsibilities in the Cloud
- Setup Honeypot on Kali Linux
- Enabling an Intrustion Detection Policy
- Removing Unnecessary Services
Cloud Application Security
- Authorization of an User
- Examining File Permissions
- Cross-site request forgery with low complexity
- Reviewing the Top 10 OWASP Attacks
- Attacking a website using XSS injection
- Conducting IP Spoofing
Operations Management
- Verify RAM Usage
- Checking Disk Capacity
- Using MBSA
Legal and Compliance Part 1
- Complete Chain of Custody
Why Do Learners Love This Course?
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us Now