Tags
Language
Tags
January 2025
Su Mo Tu We Th Fr Sa
29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Ultimate Ccsp Certified Cloud Security Professional Training

Posted By: ELK1nG
Ultimate Ccsp Certified Cloud Security Professional Training

Ultimate Ccsp Certified Cloud Security Professional Training
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.31 GB | Duration: 23h 49m

Train for ISC2 CCSP and Get the Knowledge and Skills needed to Build, Maintain, Assess Cloud Infrastructure #UNOFFICIAL

What you'll learn

Learn the Knowledge areas of the 6 Domains of CCSP in detail

Get Real World Examples that will help you in your preparation efforts for the CCSP Exam

Get Access to +22 Hours of Training Content that is curated to help you master the concepts

Access to Handy and useful resources that will help you toward CCSP achievement

Requirements

Basic IT & Security Knowledge

Understanding the Cloud Computing Concept and Idea

Passion and willingness to pursue the ISC2 CCSP Certification

Description

What is the CCSP?The Certified Cloud Security Professional (CCSP) certification is an industry-leading credential developed by (ISC)² to validate the expertise of professionals in cloud security. The primary goal of the CCSP certification is to ensure that cloud security professionals possess the necessary knowledge, skills, and abilities to design, implement, and manage cloud security architectures, operations, and controls while complying with regulatory frameworks.This certification is designed to demonstrate a deep understanding of cloud security, particularly in areas such as architecture, design, operations, service orchestration, and regulatory compliance. The CCSP measures a candidate’s competence against a globally recognized body of knowledge (CBK), ensuring that certified professionals are equipped to address modern cloud security challenges.Key Focus Areas of the CCSP CertificationThe CCSP curriculum is built around six critical domains that encompass the essential aspects of cloud security. These domains ensure that candidates gain a comprehensive understanding of the concepts and practical skills needed in the cloud security profession:Cloud Concepts, Architecture, and Design – 17%Covers cloud computing models, architectures, and essential design principles.Understand the security implications of deploying cloud technologies.Cloud Data Security – 20%Focuses on protecting cloud data, ensuring confidentiality, integrity, and availability.Covers encryption, data masking, and secure data storage in cloud environments.Cloud Platform & Infrastructure Security – 17%Involves securing cloud infrastructure and platforms.Includes knowledge of virtualization, containers, and securing cloud resources.Cloud Application Security – 17%Addresses secure development practices in cloud-based applications.Covers cloud-specific application vulnerabilities and threat management.Cloud Security Operations – 16%Focuses on managing and operating secure cloud environments.Includes incident response, monitoring, and continuous improvement in cloud security operations.Legal, Risk, and Compliance – 13%Involves understanding the legal and regulatory requirements surrounding cloud technologies.Covers risk management, compliance frameworks, and governance in cloud environments.Together, these six domains form the foundation of cloud security knowledge, providing professionals with the ability to assess risks, implement security solutions, and comply with industry regulations.Experience RequirementsThe CCSP certification has strict experience requirements to ensure that only qualified professionals are certified. Candidates must have at least five years of cumulative paid work experience in information technology. Of these five years, three years must be in information security, and one year must be in one or more of the six domains of the CCSP CBK.However, there are pathways to reduce this requirement:CSA’s CCSK certificate can substitute for one year of required experience in the CCSP domains.CISSP certification can fully waive the experience requirement for CCSP.For those who do not meet the experience requirements, there is the Associate of (ISC)² option. By passing the CCSP exam, candidates can become an Associate and will have six years to gain the required experience to earn the full CCSP certification.Accreditation and Global RecognitionThe CCSP certification is fully accredited and compliant with ANSI/ISO/IEC Standard 17024, which ensures that it meets stringent international standards. This global recognition ensures that the CCSP credential holds value in diverse markets and industries, providing a competitive advantage to certified professionals.Job Task Analysis (JTA)(ISC)² conducts periodic Job Task Analysis (JTA) to maintain the relevance of the CCSP certification. This analysis identifies the essential tasks performed by cloud security professionals and ensures that the exam content aligns with the real-world roles and responsibilities of those working in cloud security. Through this ongoing process, the CCSP exam is regularly updated to reflect the latest trends and technologies in cloud security, keeping it relevant and up to date.CCSP Examination OverviewThe CCSP exam is a three-hour, multiple-choice examination consisting of 125 questions. To pass the exam, candidates must achieve a score of 700 out of 1000 points. The exam is available in English, Chinese, Japanese, and German, and can be taken at any Pearson VUE Testing Center.Length of the exam: 3 hoursNumber of items: 125 multiple-choice questionsPassing score: 700/1000Languages available: English, Chinese, Japanese, GermanTesting centers: Pearson VUEWhy Pursue the CCSP Certification?The demand for cloud security professionals continues to grow as organizations increasingly adopt cloud technologies. A CCSP certification demonstrates expertise in cloud security, making certified professionals highly sought after by employers. By achieving the CCSP credential, you not only validate your skills but also ensure that you stay current with evolving security challenges in the cloud computing landscape.This certification is an excellent investment for professionals who want to:Enhance their cloud security skills.Advance their careers in cloud architecture, security operations, and risk management.Demonstrate their ability to implement secure cloud solutions while ensuring compliance with regulatory frameworks.The Certified Cloud Security Professional (CCSP) certification is one of the most recognized and respected credentials in the field of cloud security. By mastering the six domains covered in the CCSP CBK, professionals will be equipped with the knowledge and skills required to secure cloud environments, ensuring data protection and regulatory compliance. The exam and experience requirements are designed to ensure that only qualified professionals are certified, and the accreditation of the CCSP further emphasizes its global value.For those pursuing a career in cloud security, the CCSP provides the perfect opportunity to validate your expertise, advance your career, and become a leader in the cloud security space.

Overview

Section 1: Welcome to CCSP Training!

Lecture 1 CCSP Course Introduction

Lecture 2 How to get the most out of this course?

Lecture 3 About Trainer

Lecture 4 Useful Links and Resources

Section 2: Domain 1: Cloud Concepts, Architecture and Design - Obj 1.1 & 1.2

Lecture 5 Introduction to Cloud computing Obj. 1.1

Lecture 6 Cloud Computing Shared Responsibility Matrix and Shared Considerations Obj1.1-2

Lecture 7 Cloud deployment models - Private, Public, Hybrid Obj. 1.2

Lecture 8 Benefits of Cloud Computing and Economy of Scale Obj. 1.2

Lecture 9 Fault Domain, Availability Domain and Region in Cloud Computing

Lecture 10 Cloud Native Architecture

Lecture 11 Understand the Multi-tenancy / Resource Sharing

Lecture 12 Infrastructure as Code & Infrastructure as Code (IaC) strategy Obj. 1.3

Lecture 13 API and API Gateway Obj 4.5

Lecture 14 Understand CapEX & OpEX

Section 3: Domain 1: Cloud Concepts, Architecture and Design - Obj 1.3

Lecture 15 Virtualization Obj. 1.3

Lecture 16 Virtualization Security Obj. 1.3

Lecture 17 Containers Obj. 1.3

Lecture 18 Containers Security Threats and Best Practices Obj. 1.3

Lecture 19 Docker Overview, Threats, Best Practices Obj. 1.3

Lecture 20 Kubernetes Overview, Threats, Best Practices Obj. 1.3

Lecture 21 Serverless Computing and Microservices technology Obj. 1.3

Lecture 22 SDN - Software Defined Networks Obj. 1.3

Lecture 23 NFV - Network Function Virtualization Obj. 1.3

Section 4: Domain 1: Cloud Concepts, Architecture and Design - Obj 1.3 & 1.4 & 3.5

Lecture 24 Common threats and Vulnerabilities on Cloud Computing Obj. 1.3 & 3.3

Lecture 25 Self Reading - CISA Report for Key Security Threats on Cloud Obj. 1.3 & 3.3

Lecture 26 Security Vulnerabilities

Lecture 27 Vulnerability Related Terms, CVE, CVSS

Lecture 28 Advanced Persistent Threats

Lecture 29 DOS & DDOS Attacks

Lecture 30 Understand Security Controls

Lecture 31 Best Practices in Control Selection, Design, Operations Obj. 1.4

Lecture 32 Defence in Depth Concept

Lecture 33 Zero Trust vs Trust but Verify

Lecture 34 Self-Reading Zero Trust Guiding Principals

Section 5: Domain 1: BCP and DRP

Lecture 35 Business impact analysis (BIA) Obj. 1.4

Lecture 36 RPO & RTO Obj 3.5

Lecture 37 BCP Testing Obj 3.5

Section 6: Domain 1: Cloud Concepts, Architecture and Design - Obj 1.5

Lecture 38 Security Standards and Frameworks

Lecture 39 ISO/IEC 27017 Obj. 1.5

Lecture 40 CSA - STAR Registry and CCM, CAIQ

Lecture 41 PCI-DSS v4.0 Overview Obj. 1.5

Lecture 42 PCI-DSS v4.0.1 - Requirements Deep Dive

Lecture 43 Federal Information Processing Standard (FIPS) 140-3 Obj. 1.5

Lecture 44 Common Criteria (CC) and Security Evaluation Models Obj. 1.5

Lecture 45 Gap analysis

Lecture 46 Knowledge Check

Section 7: Domain 2 - Cloud Data Security - Obj 2.1, 2.2, 2.3

Lecture 47 Data lifecycle Obj. 2.1

Lecture 48 Data Storage and Retention and Archiving Obj. 2.2

Lecture 49 Common threats on Cloud Storage - Malware

Lecture 50 Data dispersion in the Cloud and Data Flow Obj. 2.1

Lecture 51 Cloud Storage Services

Lecture 52 Data Disposal Obj 2.2

Lecture 53 Storage Redundancy Through RAID

Lecture 54 Data Roles (Owner, Custodian, User)

Lecture 55 Data Protection Policies, Encryption and Classification Obj 3.4

Lecture 56 Knowledge Check

Section 8: Domain 2 - Cloud Data Security - Cryptography

Lecture 57 Encryption 101 Obj. 2.3

Lecture 58 Symmetric Encryption

Lecture 59 Asymmetric Encryption

Lecture 60 Public Key Infrastructure

Lecture 61 Digital Certificates

Lecture 62 Hashing Obj. 2.3

Lecture 63 Digital Signature and Non-Repudiation Obj. 2.8

Lecture 64 Knowledge Check

Section 9: Domain 2 - Cloud Data Security - Obj 2.4, 2.5, 2.6, 2.7, 2.8

Lecture 65 Secrets and Key Management Obj. 2.3

Lecture 66 Data obfuscation & Tokenization Obj. 2.3

Lecture 67 Data Discovery and Governance Tools Obj. 2.4

Lecture 68 Data Classification Obj. 2.5

Lecture 69 Data loss prevention (DLP) Obj. 2.3

Lecture 70 Information Rights Management (IRM) & Digital Rights Management Obj. 2.6

Lecture 71 DRM tool Usage and Examples

Lecture 72 Intellectual Properties

Lecture 73 Knowledge Check

Section 10: Domain 3 - Cloud Platform and Infrastructure Security

Lecture 74 Design a secure data centre and Datacenter Tiers Obj 3.2

Lecture 75 Physical and environmental protection Obj 3.4

Lecture 76 Physical Access Control

Lecture 77 Knowledge Check

Section 11: Domain 4 - Cloud Application Security

Lecture 78 Application Development Key Concepts Obj 4.1

Lecture 79 Software Development Methodologies Obj 4.2

Lecture 80 Common pitfalls in Software Development Obj 4.1

Lecture 81 OWASP Top 10 Obj 4.3

Lecture 82 CWE - Common Weak Enumeration Obj 4.3

Lecture 83 SANS - Top 25 Obj 4.3

Lecture 84 Threat modeling - STIRDE, DREAD, PASTA Obj 4.3

Lecture 85 Self Reading - Threat modeling - ATASM Obj 4.3

Lecture 86 Self Reading - ASVS & SAFECode Obj 4.3

Lecture 87 Secure Coding 101 Obj 4.3

Lecture 88 Self Reading - ISO 27034-1 Standards for Secure App Development

Lecture 89 Version Control System Obj 4.3

Lecture 90 Knowledge Check

Section 12: Domain 4 - Cloud Application Security

Lecture 91 Software Testing Obj 4.4

Lecture 92 Test Case and Abuse Case Obj 4.4

Lecture 93 Software Security Testing Obj 4.4

Lecture 94 Release management Obj 5.3

Lecture 95 QA & QC Obj 4.4

Lecture 96 Penetration Testing Obj 4.4

Lecture 97 DevOps

Lecture 98 DevOps security Obj. 1.4

Lecture 99 Third-party software management Obj 4.5

Lecture 100 Knowledge Check

Section 13: Domain 4: - Cloud Application Security

Lecture 101 Identity and access control Obj. 1.3

Lecture 102 Privileged Access Management Obj. 1.3

Lecture 103 Authorization Models and RBAC

Lecture 104 Single sign-on (SSO) & RSO & MTLS Obj 4.7

Lecture 105 Key Access Control Concepts

Lecture 106 Federated identity and IdP, OpenID, SAML, Auth Protocols Obj 4.7

Lecture 107 MFA and Biometric Authentication Obj 4.7

Lecture 108 SASE & CASB Obj 4.7

Lecture 109 Knowledge Check

Section 14: Domain 4 - Cloud Application Security

Lecture 110 What is Load Balancer

Lecture 111 Domain Name System DNS & Security Extensions (DNSSEC) and Securing DNS

Lecture 112 Network Availability - Single Home, Multi Home, and Understand CDN

Lecture 113 Self Reading - Packet Broker

Lecture 114 Databases

Lecture 115 Database Security Obj 4.6

Lecture 116 Knowledge Check

Section 15: Domain 5 - Cloud Security Operations

Lecture 117 Securing Servers, Applications and Backup Policies

Lecture 118 Firewalls, DMZ & HoneyPots and HoneyNets

Lecture 119 IPS & IDS

Lecture 120 Virtual private network (VPN)

Lecture 121 VLANs and Segmentation

Lecture 122 Web application firewall (WAF) Obj 4.6

Lecture 123 Proxy and Web Filtering

Lecture 124 Sandboxing Obj 4.6

Lecture 125 Network Security Practices and Policies

Lecture 126 Knowledge Check

Section 16: Domain 5 - Cloud Security Operations

Lecture 127 Change Management

Lecture 128 Configuration management Obj 5.3

Lecture 129 Patch Management and Vulnerability Management Obj. 1.3

Lecture 130 Performance Monitoring and KPI

Lecture 131 Key Performance Indicators

Lecture 132 Knowledge Check

Section 17: Domain 5 - Cloud Security Operations

Lecture 133 Incident management

Lecture 134 Incident Response Plan

Lecture 135 Log Management Obj. 2.8

Lecture 136 Forensic data collection methodologies Obj 5.4

Lecture 137 Security operations center (SOC)

Lecture 138 SIEM

Lecture 139 Knowledge Check

Section 18: Domain 6 - Legal, Risk and Compliance

Lecture 140 Laws, Regulations, Act

Lecture 141 US Federal Laws 1

Lecture 142 US Federal Laws 2

Lecture 143 Understand the PII & PHI

Lecture 144 Privacy Regulations

Lecture 145 The EU-U.S. Data Privacy Framework (DPF), and Privacy Shield

Lecture 146 The Privacy Policy

Lecture 147 Privacy Controls, Privacy Impact Assessments and E-Discovery, and Data Flow

Lecture 148 Knowledge Check

Section 19: Domain 6 - Legal, Risk and Compliance

Lecture 149 Policies

Lecture 150 Standards

Lecture 151 Procedures and Guidelines

Lecture 152 Cloud Related Policies and Understand Data Residency and Sovereignty

Lecture 153 Knowledge Check

Section 20: Domain 6 - Legal, Risk and Compliance

Lecture 154 Risk Management Overview Obj 3.3

Lecture 155 Risk Identification Obj 3.3

Lecture 156 Risk Analysis Obj 3.3

Lecture 157 Risk Evaluation and Treatment Obj 3.3

Lecture 158 Risk Monitoring and Reporting

Lecture 159 COSO ERM

Lecture 160 ISO 31000 & 27005

Lecture 161 NIST RMF

Lecture 162 Knowledge Check

Section 21: Domain 6 - Legal, Risk and Compliance

Lecture 163 Information System Auditing Overview

Lecture 164 Internal and external audit controls

Lecture 165 Audit planning

Lecture 166 Legal Impact on Audit Engagement

Lecture 167 SSAE & ISAE

Lecture 168 SOC Audit Report

Lecture 169 Knowledge Check

Section 22: Domain 6 - Legal, Risk and Compliance

Lecture 170 Vendor management

Lecture 171 Self Reading - Contract Management

Lecture 172 SoW, RFI, RFB, RFP, Bidding Process

Lecture 173 SLA, OLA and Overview of IT Infrastructure Library Services

Lecture 174 Supply-chain management

Lecture 175 Knowledge Check

Section 23: CCSP - Emerging Technologies

Lecture 176 Industrial Control System - ICS and Operational Technology

Lecture 177 Artificial Intelligence and Machine Learning

Lecture 178 Types of AI, Narrow, General

Lecture 179 Cryptography Advancements and Block Chain and Impact of Quantum Computing

Lecture 180 Knowledge Check

Section 24: Practice Exams

IT Professionals,Security Professionals,Cloud Computing Specialists,Anyone Interested to become CCSP!