(ISC)- CCSP Certified Cloud Security Professional 17+ Hours Course & PDF Guides
$15.00
Price: $15.00 USD | Size: 4.58 GB | Duration : 17+ Hours | 126 Video Lessons | Bonus : (ISC)² CCSP PDF Guides
BRAND :
ENGLISH | INSTANT DOWNLOAD |⭐️⭐️⭐️⭐️⭐️ 5.0
Description
Price: $15.00 USD | Size: 4.58 GB | Duration : 17+ Hours | 126 Video Lessons | Bonus : (ISC)² CCSP PDF Guides
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD |⭐️⭐️⭐️⭐️⭐️ 5.0
(ISC)² CCSP – Certified Cloud Security Professional 17+ Hours Course & PDF Guides
CCSP Online Training
This intermediate (ISC)² CCSP training prepares learners to take the CCSP exam, which is the one required exam to earn the (ISC)² Certified Cloud Security Professional (CCSP) certification.
Whether you want to enjoy a career as an enterprise-level architect or security administrator, systems engineer or security manager, the CCSP is sure to provide you with the career leverage you need. Use your in-depth knowledge of Cloud data security, cloud platform and infrastructure security, and cloud application security to transcend the humdrum of your desk job. Move into a career in motion with your CCSP.
For anyone who leads an IT team, this CCSP training can be used for CCSP exam prep, on-boarding new security professionals, or as part of a team training plan.
CCSP: What You Need to Know
This (ISC)² Certified Cloud Security Professional (CCSP) training covers CCSP exam cloud security exam objectives, including these topics:
- Architectural concepts and design requirements
- Cloud data security
- Cloud platform and infrastructure security
- Cloud application security
- Operations
- Legal and compliance
Who Should Take CCSP Training?
This CCSP training is considered professional-level (ISC)² training, which means it was designed for security professionals. This cloud security skills course is valuable for new IT professionals with at least a year of experience with cloud security and experienced security professionals looking to validate their (ISC)² skills.
New or aspiring security professionals. If you’re a new security professional, or you’re imagining a career in security, this CCSP training is one of the many opportunities you’ll haveto choose paths and directions for your future career. There’s no one-size-fits-all system for enterprise security needs, and the same is true of training: it’s only by diversifying your knowledge and certifications that you’ll be sure to have a long and stable career.
Experienced security professionals. Even experienced security professionals have plenty to learn about the field. Whether it’s legal and compliance regulations, or how architectural concepts and design requirements affect your future decisions about operations, this training will show you just how many holes there are to patch, loops there are to close and regulations to learn as you continue on your security journey.
Cloud Concepts and Architecture
1. Cloud Computing Roles
5 mins
2. Cloud Computing Characteristics
8 mins
3. Cloud Deployment Models
13 mins
4. Infrastructure as a Service (IaaS)
5 mins
5. Platform as a Service (PaaS)
3 mins
6. Software as a Service (SaaS)
7 mins
7. Shared Responsibility
5 mins
8. Impact From Emerging Technologies
12 mins
Security Concepts and the Cloud
1. Cryptography and Key Management
14 mins
2. Access Control with IAM
9 mins
3. Data and Media Sanitization
8 mins
4. Network and Virtualization Security
15 mins
5. Common Threats in the Cloud
13 mins
Secure Cloud Computing Design Principles
1. Cloud Secure Data Lifecycle
7 mins
2. Data Governance
10 mins
3. Cloud Based DR and BC
15 mins
4. Cost Benefit Analysis
9 mins
5. Functional Requirements
5 mins
6. Security Considerations for Different Cloud Categories
10 mins
Evaluating Cloud Service Providers
1. Evaluating Cloud Service Providers
4 mins
2. ISO/IEC 27017
10 mins
3. PCI-DSS
5 mins
4. ENISA
9 mins
5. CSA STAR
9 mins
6. Additional Standards
12 mins
Cloud Data Concepts and Storage Architecture
1. Cloud Data Lifecycle
12 mins
2. Data Functions
11 mins
3. Data Dispersion
7 mins
4. Cloud Storage Types
12 mins
5. Threats to Storage
11 mins
Data Security Technologies
1. The Encryption Process and the Cloud
8 mins
2. IaaS Data Encryption Options
8 mins
3. Key Management
9 mins
4. Data Hashing
5 mins
5. Data Obfuscation and Anonymization
10 mins
6. Data Loss Prevention (DLP)
9 mins
Data Discovery, Classification and IRM
1. Data Discovery
5 mins
2. Data Discovery Techniques and Issues
6 mins
3. Data Classification
8 mins
4. Information Rights Management (IRM)
11 mins
5. Data Retention and Deletion
5 mins
6. Data Archival
4 mins
7. Logs and Auditability
6 mins
8. Log Storage
6 mins
9. Chain of Custody and Non-Repudiation
6 mins
Cloud Infrastructure Components
1. Intro
1 min
2. Physical Environment
12 mins
3. Networking and Communications
13 mins
4. Compute and Storage
11 mins
5. Virtualization
6 mins
6. Management Plane
7 mins
Secure Datacenter Design
1. Intro
1 min
2. Datacenter Services
7 mins
3. Datacenter Security
10 mins
4. Physical Design
7 mins
5. Temperature and Humidity
7 mins
6. The Importance of Airflow
9 mins
7. Multi-Vendor Pathway Connectivity
4 mins
Cloud Infrastructure Risk and Security
1. Risk Assessments
12 mins
2. Cloud Infrastructure Risk and Security
12 mins
3. Cloud Specific Risks
5 mins
4. Virtualization Risks
7 mins
5. Countermeasure Strategies
7 mins
6. Physical and Environmental Protection
5 mins
7. System and Communication Protection
10 mins
Protecting Virtualized Systems and BCDR
1. Protecting Virtualized Systems
10 mins
2. Identification, Authentication and Authorization
8 mins
3. Audit Mechanisms
9 mins
4. Risks Related to the Cloud and BCDR
11 mins
5. Business Requirements for BCDR
9 mins
6. BCDR Strategy and Planning
14 mins
7. BCDR Testing
7 mins
Secure SDLC Process and Application
1. Business Requirements
6 mins
2. Phases of the SDLC
7 mins
3. Development Methodologies
5 mins
4. Cloud Specific Risks
10 mins
5. Threat Modeling
13 mins
6. Secure Coding Techniques
6 mins
Application Security and Software Assurance
1. Intro
1 min
2. Common Cloud Application Vulnerabilities
8 mins
3. Cloud Development Basics
9 mins
4. Functional and Non-Functional Testing
4 mins
5. Security Testing Methodologies
9 mins
6. Quality Assurance
7 mins
7. Abuse Case Testing
4 mins
Cloud Application Architecture and IAM
1. Supplemental Security Components
16 mins
2. Cryptography and Applications
10 mins
3. Application Virtualization and Orchestration
11 mins
4. Federated Identity, MFA, OTP and SSO
10 mins
5. CASB and Secrets Management
8 mins
Implement Cloud Infrastructure
1. Hardware Specific Security Configurations
9 mins
2. Security Configurations
6 mins
3. Virtualization Toolset
4 mins
4. Controlling Access
7 mins
5. Securing the Network
13 mins
6. Operating System Security
5 mins
7. Stand Alone Hosts in the Cloud
5 mins
Managing Cloud Infrastructure
1. Managing It All
7 mins
2. Backups and Availability
10 mins
3. Operational Controls and Standards
8 mins
4. Supporting Digital Forensics
15 mins
5. Managing Communications
6 mins
6. Managing Security Operations
9 mins
Legal, Risk and Privacy in the Cloud
1. Intro to Legal, Risk and Privacy in the Cloud
1 min
2. Legal Requirements and Unique Risks in the Cloud
4 mins
3. Legal Frameworks and Guidelines
4 mins
4. E-Discovery and Forensic Requirements
8 mins
5. Contractual vs Regulated Private Data
3 mins
6. Country-Specific Legislation of Data Privacy
11 mins
7. Privacy Standards and PIAs
9 mins
8. Skill Review
12 mins
Auditing in the Cloud
1. Intro: Auditing in the Cloud
1 min
2. Audit Controls and Assurance
7 mins
3. Audit Reports
7 mins
4. Gap Analysis and Audit Planning
6 mins
5. ISMS and ISCS
5 mins
6. Policies
4 mins
7. identification and Involvement of Relevant Stakeholders
3 mins
8. Specialized Compliance Requirements
4 mins
9. Impact of a Distributed IT Model
5 mins
Risk Management and Cloud Contract Design
1. Assessing Risk Management and Data Roles
8 mins
2. Regulatory Transparency and Risk Treatment
8 mins
3. Risk Frameworks, Metrics and Environments
7 mins
4. Business Requirements and Vendor Management
10 mins
5. Contract Management
7 mins
6. Supply Chain Management
6 mins
(ISC)² CCSP – Certified Cloud Security Professional FAQs
What will you learn in this cloud security professional training?
You’ll learn advanced technical skills in cloud security administration from this course – from designing data center-sized cloud networks to managing operations and actively configuring security settings. Take this course to gain first-hand experience locking down apps and infrastructure according to industry best practices for cloud network security administration.
Who should take this CCSP course?
Although this course is best for people already doing cloud network security administration, it can also help catapult brand new IT professionals to advanced positions of responsibility. Typically, people already working as cloud architects, cloud engineers, cloud security specialists and analysts – or anyone who wants to become one – take this CCSP course.
Is this training in cloud security practices associated with any certifications?
Yes, this advanced cloud security administration training is directly related to the CCSP certification from (ISC)2. The CCSP is a very well-known and well-regarded IT industry certification – in fact, a majority of all IT professionals plan to earn it. It’s so good that even non-security personnel aim to earn it.
What certification should you consider after taking this course in cloud security?
Like so many cybersecurity courses from CBT Nuggets, this course is designed with your practical knowledge in mind first, and the certification exam second. That means that although you should plan to earn the CCSP after this course, you can also use this CCSP course to help prepare for different cybersecurity certifications.
Why should you take this Certified Cloud Security Professional (CCSP) training?
You should take this CCSP training because the CCSP is one of the most robust and thorough cybersecurity certifications in the industry. (ISC)2, the professional organization that issues the CCSP, has been validating the skills and experience of IT professionals in information security for years and joining their ranks is a great career move.
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.