Back to Course
(ISC)2 Certified Cloud Security Professional
0% Complete
0/0 Steps
-
Introduction
CCSP Course Introduction -
Domain 1 Cloud Concepts, Architecture and Design1.1-1 Cloud Computing Definitions
-
1.1-2 Cloud Computing Roles
-
1.1-3 Building Block Technologies
-
1.2-1 Cloud Service Capabilities
-
1.2-2 Cloud Deployment Models
-
1.2-3 Cloud Computing Terms Part 1
-
1.2-4 Cloud Computing Terms Part 2
-
1.2-5 Privacy, Regulations, and Auditing
-
1.2-6 Service Levels and Contracts
-
1.2-7 Maintenance and Versioning
-
1.2-8 Related Technologies
-
1.3-1 Cryptography
-
1.3-2 Key Management
-
1.3-3 Public Key Infrastructure
-
1.3-4 Asymmetric Algorithms
-
1.3-5 Symmetric Algorithms
-
1.3-6 Access Control
-
1.3-7 Data and Media Sanitization
-
1.3-8 Network Security
-
1.3-9 Virtualization Security
-
1.4-1 Business Continuity
-
1.4-2 Cost Benefit Analysis
-
1.4-3 Service Category Security
-
1.5-1 Security Standards
-
1.5-2 Product Verification
-
CCSP Domain 1 Conclusion
-
Domain 1 Quizzes2 Quizzes
-
Domain 2 Cloud Data Security2.1-1 Cloud Data Lifecycle
-
2.1-2 Data Dispersion
-
2.2-1 Storage Types
-
2.3-1 Key Management
-
2.3-2 Hashing
-
2.3-3 Obfuscation
-
2.3-4 Data Loss Prevention
-
2.3-5 Tokenization and Data De-Identification
-
2.4-1 Data Discovery
-
2.4-2 Data Structure
-
2.5-1 Mapping and Labeling
-
2.5-2 Sensitive Data
-
2.6-1 Information Rights Management
-
2.7-1 Data Retention
-
2.7-2 Data Archiving and Legal Hold
-
2.8-1 Auditing
-
2.8-2 Log Analysis and Storage
-
CCSP Domain 2 Conclusion
-
CCSP Domain 2 Quizzes2 Quizzes
-
Domain 3 Cloud Platform and Infrastructure Security3.1-1 Virtualization
-
3.1-2 Networking Planes
-
3.2-1 Tenant Partitioning
-
3.2-2 Zones and Topologies
-
3.2-3 Location
-
3.2-4 Environmental Design
-
3.3-1 Risk Management Introduction
-
3.3-2 Threat Assessment
-
3.3-3 Identifying Cloud Vulnerabilities
-
3.3-4 Quantitative Risk Assessment
-
3.3-5 Qualitative Risk Assessment
-
3.3-6 Risk Response Techniques
-
3.3-7 Penetration Testing
-
3.3-8 Cyber Risk Insurance
-
3.4-1 Five Ds of Physical Security
-
3.4-2 Physical Controls
-
3.4-3 Fire Suppression
-
3.4-4 Locks
-
3.4-5 Detection Devices
-
3.4-6 Uptime and Availability
-
3.4-7 Redundancy
-
3.5-1 Business Continuity
-
3.5-2 Recovery Time and Point Objectives
-
3.5-3 Disaster Recovery
-
3.5-4 Business Continuity Testing
-
CCSP Domain 3 Conclusion
-
Domain 3 Quizzes2 Quizzes
-
Domain 4 Cloud Application Security4.1-1 Training and Awareness
-
4.2-1 Software Development Life Cycle
-
4.2-2 Development Life Cycle Models
-
4.3-1 OWASP Top 10 Part 1
-
4.3-2 OWASP Top 10 Part 2
-
4.3-3 Threat Modeling
-
4.3-4 Threat Intelligence
-
4.3-5 Patch Management
-
4.3-6 HTML Injection
-
4.3-7 HTML Injection (Persistent)
-
4.3-8 Broken Authentication
-
4.4-1 Software Testing
-
4.5-1 Application Programming Interfaces
-
4.5-2 API Security
-
4.5-3 Supply Chain Security
-
3.6.1 Security Components
-
3.6.2 Sandboxing and Virtualization
-
4.7-1 Federation
-
4.7-2 Federation Technologies
-
4.7-3 Multifactor Authentication
-
4.7-4 Kerberos
-
CCSP Domain 4 Conclusion
-
Domain 4 Quizzes2 Quizzes
-
Domain 5 Cloud Security Operations5.1-1 Storage Hardware
-
5.1-2 Data Storage
-
5.1-3 Virtualization Management
-
5.2-1 KVM and Remote Access
-
5.2-2 DHCP, and DNS
-
5.2-3 PKI and TLS
-
5.2-4 Virtual Private Networks Part 1
-
5.2-5 Virtual Private Networks Part 2
-
5.2-6 OS Security
-
5.2-7 Stand Alone and Clustered Hosts
-
5.3-1 Device Monitoring
-
5.3-2 Storage Monitoring
-
5.3-3 Firewalls and NSGs
-
5.3-4 Application Protection
-
5.3-5 IDS and IPS
-
5.3-6 Honeypots and Honeynets
-
5.3-7 Vulnerability Scanning
-
5.3-8 Backups
-
5.4-1 Service Management
-
5.5-1 Forensics
-
5.5-2 Chain of Custody
-
5.6-1 Vendor Relations
-
5.6-2 Customer and Partner Relations
-
5.6-3 Regulator Relations
-
5.7-1 SOC
-
4.3.2 SIEM
-
5.7-3 Incident Response
-
CCSP Domain 5 Conclusion
-
Domain 5 Quizzes2 Quizzes
-
Domain 6 Legal, Risk, and Compliance6.1-1 United States Legislation
-
6.1-2 eDiscovery
-
6.1-3 Intellectual Property
-
6.2-1 International Legislation
-
6.3-1 Audit Controls
-
6.3-2 Audit Reports
-
6.4-1 Risk Management Part 1
-
6.4-2 Risk Management Part 2
-
6.4-3 Frameworks
-
6.5-1 Contracts Part 1
-
6.5-2 Contracts Part 2
-
6.5-3 Contract Management
-
6.5-4 Supply Chain Management
-
CCSP Course Conclusion
-
Exam Registration
-
Domain 6 Quizzes2 Quizzes
Lesson 69 of 142
In Progress