Back to Course

(ISC)2 Certified Cloud Security Professional

0% Complete
0/0 Steps
  1. Introduction

    CCSP Course Introduction
  2. Domain 1 Cloud Concepts, Architecture and Design
    1.1-1 Cloud Computing Definitions
  3. 1.1-2 Cloud Computing Roles
  4. 1.1-3 Building Block Technologies
  5. 1.2-1 Cloud Service Capabilities
  6. 1.2-2 Cloud Deployment Models
  7. 1.2-3 Cloud Computing Terms Part 1
  8. 1.2-4 Cloud Computing Terms Part 2
  9. 1.2-5 Privacy, Regulations, and Auditing
  10. 1.2-6 Service Levels and Contracts
  11. 1.2-7 Maintenance and Versioning
  12. 1.2-8 Related Technologies
  13. 1.3-1 Cryptography
  14. 1.3-2 Key Management
  15. 1.3-3 Public Key Infrastructure
  16. 1.3-4 Asymmetric Algorithms
  17. 1.3-5 Symmetric Algorithms
  18. 1.3-6 Access Control
  19. 1.3-7 Data and Media Sanitization
  20. 1.3-8 Network Security
  21. 1.3-9 Virtualization Security
  22. 1.4-1 Business Continuity
  23. 1.4-2 Cost Benefit Analysis
  24. 1.4-3 Service Category Security
  25. 1.5-1 Security Standards
  26. 1.5-2 Product Verification
  27. CCSP Domain 1 Conclusion
  28. Domain 1 Quizzes
    2 Quizzes
  29. Domain 2 Cloud Data Security
    2.1-1 Cloud Data Lifecycle
  30. 2.1-2 Data Dispersion
  31. 2.2-1 Storage Types
  32. 2.3-1 Key Management
  33. 2.3-2 Hashing
  34. 2.3-3 Obfuscation
  35. 2.3-4 Data Loss Prevention
  36. 2.3-5 Tokenization and Data De-Identification
  37. 2.4-1 Data Discovery
  38. 2.4-2 Data Structure
  39. 2.5-1 Mapping and Labeling
  40. 2.5-2 Sensitive Data
  41. 2.6-1 Information Rights Management
  42. 2.7-1 Data Retention
  43. 2.7-2 Data Archiving and Legal Hold
  44. 2.8-1 Auditing
  45. 2.8-2 Log Analysis and Storage
  46. CCSP Domain 2 Conclusion
  47. CCSP Domain 2 Quizzes
    2 Quizzes
  48. Domain 3 Cloud Platform and Infrastructure Security
    3.1-1 Virtualization
  49. 3.1-2 Networking Planes
  50. 3.2-1 Tenant Partitioning
  51. 3.2-2 Zones and Topologies
  52. 3.2-3 Location
  53. 3.2-4 Environmental Design
  54. 3.3-1 Risk Management Introduction
  55. 3.3-2 Threat Assessment
  56. 3.3-3 Identifying Cloud Vulnerabilities
  57. 3.3-4 Quantitative Risk Assessment
  58. 3.3-5 Qualitative Risk Assessment
  59. 3.3-6 Risk Response Techniques
  60. 3.3-7 Penetration Testing
  61. 3.3-8 Cyber Risk Insurance
  62. 3.4-1 Five Ds of Physical Security
  63. 3.4-2 Physical Controls
  64. 3.4-3 Fire Suppression
  65. 3.4-4 Locks
  66. 3.4-5 Detection Devices
  67. 3.4-6 Uptime and Availability
  68. 3.4-7 Redundancy
  69. 3.5-1 Business Continuity
  70. 3.5-2 Recovery Time and Point Objectives
  71. 3.5-3 Disaster Recovery
  72. 3.5-4 Business Continuity Testing
  73. CCSP Domain 3 Conclusion
  74. Domain 3 Quizzes
    2 Quizzes
  75. Domain 4 Cloud Application Security
    4.1-1 Training and Awareness
  76. 4.2-1 Software Development Life Cycle
  77. 4.2-2 Development Life Cycle Models
  78. 4.3-1 OWASP Top 10 Part 1
  79. 4.3-2 OWASP Top 10 Part 2
  80. 4.3-3 Threat Modeling
  81. 4.3-4 Threat Intelligence
  82. 4.3-5 Patch Management
  83. 4.3-6 HTML Injection
  84. 4.3-7 HTML Injection (Persistent)
  85. 4.3-8 Broken Authentication
  86. 4.4-1 Software Testing
  87. 4.5-1 Application Programming Interfaces
  88. 4.5-2 API Security
  89. 4.5-3 Supply Chain Security
  90. 3.6.1 Security Components
  91. 3.6.2 Sandboxing and Virtualization
  92. 4.7-1 Federation
  93. 4.7-2 Federation Technologies
  94. 4.7-3 Multifactor Authentication
  95. 4.7-4 Kerberos
  96. CCSP Domain 4 Conclusion
  97. Domain 4 Quizzes
    2 Quizzes
  98. Domain 5 Cloud Security Operations
    5.1-1 Storage Hardware
  99. 5.1-2 Data Storage
  100. 5.1-3 Virtualization Management
  101. 5.2-1 KVM and Remote Access
  102. 5.2-2 DHCP, and DNS
  103. 5.2-3 PKI and TLS
  104. 5.2-4 Virtual Private Networks Part 1
  105. 5.2-5 Virtual Private Networks Part 2
  106. 5.2-6 OS Security
  107. 5.2-7 Stand Alone and Clustered Hosts
  108. 5.3-1 Device Monitoring
  109. 5.3-2 Storage Monitoring
  110. 5.3-3 Firewalls and NSGs
  111. 5.3-4 Application Protection
  112. 5.3-5 IDS and IPS
  113. 5.3-6 Honeypots and Honeynets
  114. 5.3-7 Vulnerability Scanning
  115. 5.3-8 Backups
  116. 5.4-1 Service Management
  117. 5.5-1 Forensics
  118. 5.5-2 Chain of Custody
  119. 5.6-1 Vendor Relations
  120. 5.6-2 Customer and Partner Relations
  121. 5.6-3 Regulator Relations
  122. 5.7-1 SOC
  123. 4.3.2 SIEM
  124. 5.7-3 Incident Response
  125. CCSP Domain 5 Conclusion
  126. Domain 5 Quizzes
    2 Quizzes
  127. Domain 6 Legal, Risk, and Compliance
    6.1-1 United States Legislation
  128. 6.1-2 eDiscovery
  129. 6.1-3 Intellectual Property
  130. 6.2-1 International Legislation
  131. 6.3-1 Audit Controls
  132. 6.3-2 Audit Reports
  133. 6.4-1 Risk Management Part 1
  134. 6.4-2 Risk Management Part 2
  135. 6.4-3 Frameworks
  136. 6.5-1 Contracts Part 1
  137. 6.5-2 Contracts Part 2
  138. 6.5-3 Contract Management
  139. 6.5-4 Supply Chain Management
  140. CCSP Course Conclusion
  141. Exam Registration
  142. Domain 6 Quizzes
    2 Quizzes