This site is powered by
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Cloud Security Professional (CCSP)
Module 1 Cloud Concepts, Architecture, and Design
1 Introduction CCSP (8:08)
2 Cloud Concepts, Architecture and Design CCSP (4:30)
3 What is Cloud Computing- CCSP (4:31)
4 Roles in Cloud Computing CCSP (5:23)
5 Cloud Security Concepts CCSP (5:28)
6 Cloud Service Models CCSP (5:21)
7 Infrastructure as a Service (IaaS) CCSP (5:03)
8 IaaS Specific Risks CCSP (5:44)
10 PaaS Risks CCSP (3:51)
11 Software as a Service (SaaS) CCSP (4:18)
12 SaaS Risks CCSP (6:00)
13 Virtualization Risks CCSP (5:45)
14 Cloud Deployment Models CCSP (5:05)
15 Public Cloud Deployment CCSP (4:00)
16 Public Cloud Deployment Risks CCSP (6:53)
17 Vendor Lock-In CCSP (4:51)
18 Vendor Lock-Out CCSP (4:25)
19 Multitenant Environment Risks CCSP (3:51)
20 Private Cloud Deployments CCSP (3:36)
21 Private Cloud Deployment Risks CCSP (6:41)
22 Community Cloud Deployments CCSP (4:20)
23 Community Cloud Deployment Risks CCSP (3:58)
24 Cloud Security Process CCSP (7:05)
25 Security Responsibility by Service Model CCSP (6:39)
26 Defense In Depth CCSP (6:45)
27 Cloud Security Frameworks and Standards CCSP (5:39)
28 Cost Benefit Analysis CCSP (6:25)
29 Developing Business Requirements CCSP (5:48)
30 Business impact Analysis CCSP (7:52)
31 Developing Security Requirements CCSP (5:10)
32 Domain 1 Summary CCSP (4:33)
Module 2 Cloud Data Security
1 Cloud Data Security and Data Classification CCSP (3:20)
2 Data Classification CCSP (5:48)
3 Data Roles CCSP (5:37)
4 Cloud Data Lifecycle CCSP (4:50)
5 Data Discovery CCSP (4:40)
6 Cloud Data Security Strategies CCSP (3:55)
7 Encrypting Data CCSP (5:42)
8 Encryption Types CCSP (5:12)
9 Encryption and Key Management CCSP (6:19)
10 Federal Information Processing Standard CCSP (3:41)
11 Hardening Devices CCSP (6:50)
12 Jurisdiction Requirements CCSP (4:16)
13 Protecting Data in Transit CCSP (3:39)
14 Data Storage Architecture CCSP (6:44)
15 Data Retention Policy CCSP (5:28)
16 Data Destruction Methods CCSP (4:29)
17 Auditability, Traceability and Accountability CCSP (6:39)
18 Data Audit Policy CCSP (6:18)
19 Data Privacy CCSP (6:14)
20 Privacy Safeguards CCSP (5:07)
21 Data Obfuscation CCSP (5:45)
22 Data Masking CCSP (3:41)
23 Tokenization CCSP (3:44)
24 Information Rights Management (IRM) CCSP (4:13)
25 Information Rights Implementation CCSP (5:13)
26 Information Rights Challenges CCSP (5:22)
27 Intellectual Property (US) CCSP (6:29)
28 Data Egress CCSP (4:41)
29 Domain 2 Summary CCSP (3:26)
Module 3 Cloud Platform and Infrastructure Security
1 Cloud Platform and Infrastructure Security CCSP (3:05)
2 Cloud Infrastructure Components CCSP (4:33)
3 The Management Plane CCSP (3:40)
4 Administering Middleware CCSP (4:50)
5 Virtualization CCSP (4:19)
6 Data Access CCSP (4:10)
7 Secure Networking CCSP (4:09)
8 Network Security CCSP (5:37)
9 System information and Event Management (SIEM) CCSP (5:25)
10 Cloud Provider Responsibility for Physical Plant CCSP (6:12)
11 Power Redundancy CCSP (5:50)
12 Other Redundancy and Safety Considerations CCSP (5:38)
13 Data Center Tiers CCSP (5:51)
14 Cloud Threats Part 1 CCSP (6:22)
15 Cloud Threats Part 2 CCSP (4:10)
16 Protecting Against Cloud Threats Part 1 CCSP (7:56)
17 Protecting Against Cloud Threats Part 2 CCSP (5:36)
18 Shared Responsibility for Cloud Platform Oversight CCSP (4:00)
19 Cloud-Based Business Continuity and Disaster Recovery CCSP (4:51)
20 Disaster Declaration CCSP (4:27)
21 Disaster Recovery Criteria CCSP (4:47)
22 Disaster Recovery Testing CCSP (4:58)
23 Domain 3 Summary CCSP (4:37)
Module 4 Cloud Application Security
1 Cloud Application Security CCSP (3:57)
2 Challenges of Cloud Application Deployment CCSP (7:02)
3 Training and Awareness CCSP (5:43)
4 Cloud Software Development Lifecycle (SDLC) CCSP (4:38)
5 Secure Software Development Lifecycle (SSDL) CCSP (5:42)
6 Application Security Standards CCSP (3:40)
7 Identity and Access Management (IAM) CCSP (6:03)
8 Multifactor Authentication (MFA) CCSP (5:21)
9 Single Sign-On and Federated Identity Management CCSP (5:41)
10 Federation Standards CCSP (3:27)
11 Application Programming Interfaces (APIs) CCSP (3:58)
12 API Approval and Management CCSP (4:37)
13 Open-Source Software CCSP (4:28)
14 Sandboxing CCSP (2:59)
15 Cloud Application Security Testing Concepts and Methods CCSP (4:00)
16 OWASP Top 10 CCSP (3:03)
17 OWASP Top 10 Part 1 - Code Injection CCSP (4:35)
18 OWASP Top Ten Part 2 - Broken Authentication CCSP (6:17)
19 OWASP Top 10 Part 3- Sensitive Data Exposure CCSP (5:06)
20 OWASP Top 10 Part 4- XML External Entities (XXE) CCSP (3:50)
21 OWASP Top 10 Part 5- Broken Access Control CCSP (3:14)
22 OWASP Top 10 Part 6- Security Misconfiguration CCSP (4:01)
23 OWASP Top 10 Part 7- Cross-Site Scripting (XSS) CCSP (3:19)
24 OWASP Top 10 Part 8- Insecure Deserialization CCSP (2:27)
25 OWASP Top 10 Part 9- Using Components with Known Vulnerabilities CCSP (3:34)
26 OWASP Top 10 Part 10- Insufficient Logging and Monitoring CCSP (4:31)
27 STRIDE CCSP (4:00)
28 Application Security Testing Approaches Part 1 CCSP (4:58)
29 Application Security Testing Approaches Part 2 CCSP (5:26)
30 Domain 4 Summary CCSP (4:45)
Module 5 Cloud Security Operations
1 Cloud Security Operations CCSP (3:30)
2 Change and Configuration Management CCSP (6:37)
3 Change Management CCSP (6:45)
4 Security Operations Center (SOC) CCSP (6:45)
5 Log Review Challenges CCSP (4:53)
6 Incident Response CCSP (6:17)
7 Treacherous 12 Part 1 CCSP (4:20)
8 Treacherous 12 Part 2- Data Breach CCSP (6:21)
9 Treacherous 12 Part 3- Insufficient Identity, Credential, and Access Management CCSP (5:23)
10 Treacherous 12 Part 4- Insure APIs CCSP (3:46)
11 Treacherous 12 Part 5- System Vulnerability CCSP (4:45)
12 Treacherous 12 Part 6- Account Hijacking CCSP (5:28)
13 Treacherous 12 Part 7- Malicious Insider CCSP (6:03)
14 Treacherous 12 Part 8- Advanced Persistent Threats (APTs) CCSP (6:19)
15 Treacherous 12 Part 9- Data Loss CCSP (4:58)
16 Treacherous 12 Part 10- Insufficient Due Diligence CCSP (5:08)
17 Treacherous 12 Part 11- Abuse of Cloud Services CCSP (3:39)
18 Treacherous 12 Part 12- Denial of Service CCSP (4:35)
19 Treacherous 12 Part 13- Shared Technology Vulnerability CCSP (4:30)
20 Domain 5 Summary CCSP (4:15)
Module 6 Legal, Risk, and Compliance
1 Legal, Risk and Compliance CCSP (5:00)
2 Legal Risks of Cloud Computing CCSP (6:05)
3 Due Diligence and Due Care CCSP (4:14)
4 Legal and Compliance Terms CCSP (4:34)
5 US Laws and Regulations CCSP (4:47)
6 Sarbanes-Oxley (SOX) CCSP (4:33)
7 Graham-Leach-Bliley Act (GLBA) CCSP (3:58)
8 Health Information Portability and Accountability Act (HIPAA) CCSP (4:46)
9 Payment Industry Card (PCI) CCSP (4:28)
10 General Data Protection Regulation (GDPR) CCSP (4:30)
11 GDPR Privacy Principles CCSP (4:45)
12 Risk Management CCSP (8:01)
13 Risk Management Frameworks CCSP (3:54)
14 Vendor Management CCSP (5:04)
15 Statement on Standards for Attestation Engagements (SSAE-18) CCSP (5:54)
16 Domain 6 Summary CCSP (3:42)
17 Conclusion CCSP (5:40)
12 SaaS Risks CCSP
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock