Certified Cloud Security Professional – CCSP

Certified Cloud Security Professional – CCSP

As amazing as distributed computing is for the association, understanding its data security dangers and relief methodologies is basic. Inheritance approaches are insufficient, and associations need capable, experienced experts furnished with the correct cloud security information and abilities to be fruitful. They need CCSPs.

Sponsored by the two driving non-benefits zeroed in on cloud and data security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP accreditation signifies experts with profound situated information and competency got from active involvement in digital, data, programming and distributed computing foundation security. CCSPs assist you with accomplishing the best quality for cloud security skill and empower your association to profit by the force of distributed computing while at the same time keeping delicate information secure.

Section 1: Introduction

1
Introduction

Domain 1: Architectural Concepts and Design Requirements

1
Domain 1 Architectural Concepts and Design Requirements
2
NIST SP 800 – 145
3
Managed Service Provider
4
Why Cloud Computing?
5
IaaS vs PaaS vs SaaS
6
SaaS
7
PaaS
8
IaaS
9
Cloud Deployment
10
Public Cloud
11
Private Cloud
12
Hybrid Cloud
13
Community Cloud
14
Select the right solution

Domain 2: Cloud Data Security

1
Introduction to Cloud Data Security
2
Storage Architecture
3
Data Life Cycle Security
4
Information Rights Management
5
IMR Demonstration
6
Data Loss Preventions
7
DLP Demonstration
8
Database Security
9
Data Encryption
10
Managment Control
11
Event Managment

Domain 3: Cloud Platform and Infrastructure Security

1
Introduction to Platform Security
2
Hypervisor
3
Virtualization Security
4
Perimeter Security

Domain 4: Cloud Application Security

1
Introduction to Cloud Application Security
2
Software Development Life Cycle – SDLC
3
OWASP Top 10
4
What is SQL Injection Attack
5
SQL Injection attack
6
Cross Site Scripting
7
Software Defense
8
Cryptography on the Cloud
9
Common Computer Architecture
10
Access Managment
11
Cloud Threats
12
BCP and DRP
13
Business Continuity Plans
14
Disaster Recovery Plans
15
MTD-RTO-RPO
16
VA and PT

Domain 5: Operations

1
Introduction to Operations
2
Physical Security
3
HR Security
4
Network Secuirty
5
Introduction to Risk
6
Risk
7
Asset Evaluation

Domain 6: Legal and Compliance

1
Domain 6 Introduction
2
Incident Response
3
Computer Forensic.
4
Type of Evidence
5
Types of law
6
Lialibilty

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Get course
Lectures: 59

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network