Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Cloud Security Professional (CCSP)
Module 1 Cloud Concepts, Architecture, and Design
1 Introduction CCSP (8:08)
2 Cloud Concepts, Architecture and Design CCSP (4:30)
3 What is Cloud Computing- CCSP (4:31)
4 Roles in Cloud Computing CCSP (5:23)
5 Cloud Security Concepts CCSP (5:28)
6 Cloud Service Models CCSP (5:21)
7 Infrastructure as a Service (IaaS) CCSP (5:03)
8 IaaS Specific Risks CCSP (5:44)
10 PaaS Risks CCSP (3:51)
11 Software as a Service (SaaS) CCSP (4:18)
12 SaaS Risks CCSP (6:00)
13 Virtualization Risks CCSP (5:45)
14 Cloud Deployment Models CCSP (5:05)
15 Public Cloud Deployment CCSP (4:00)
16 Public Cloud Deployment Risks CCSP (6:53)
17 Vendor Lock-In CCSP (4:51)
18 Vendor Lock-Out CCSP (4:25)
19 Multitenant Environment Risks CCSP (3:51)
20 Private Cloud Deployments CCSP (3:36)
21 Private Cloud Deployment Risks CCSP (6:41)
22 Community Cloud Deployments CCSP (4:20)
23 Community Cloud Deployment Risks CCSP (3:58)
24 Cloud Security Process CCSP (7:05)
25 Security Responsibility by Service Model CCSP (6:39)
26 Defense In Depth CCSP (6:45)
27 Cloud Security Frameworks and Standards CCSP (5:39)
28 Cost Benefit Analysis CCSP (6:25)
29 Developing Business Requirements CCSP (5:48)
30 Business impact Analysis CCSP (7:52)
31 Developing Security Requirements CCSP (5:10)
32 Domain 1 Summary CCSP (4:33)
Module 2 Cloud Data Security
1 Cloud Data Security and Data Classification CCSP (3:20)
2 Data Classification CCSP (5:48)
3 Data Roles CCSP (5:37)
4 Cloud Data Lifecycle CCSP (4:50)
5 Data Discovery CCSP (4:40)
6 Cloud Data Security Strategies CCSP (3:55)
7 Encrypting Data CCSP (5:42)
8 Encryption Types CCSP (5:12)
9 Encryption and Key Management CCSP (6:19)
10 Federal Information Processing Standard CCSP (3:41)
11 Hardening Devices CCSP (6:50)
12 Jurisdiction Requirements CCSP (4:16)
13 Protecting Data in Transit CCSP (3:39)
14 Data Storage Architecture CCSP (6:44)
15 Data Retention Policy CCSP (5:28)
16 Data Destruction Methods CCSP (4:29)
17 Auditability, Traceability and Accountability CCSP (6:39)
18 Data Audit Policy CCSP (6:18)
19 Data Privacy CCSP (6:14)
20 Privacy Safeguards CCSP (5:07)
21 Data Obfuscation CCSP (5:45)
22 Data Masking CCSP (3:41)
23 Tokenization CCSP (3:44)
24 Information Rights Management (IRM) CCSP (4:13)
25 Information Rights Implementation CCSP (5:13)
26 Information Rights Challenges CCSP (5:22)
27 Intellectual Property (US) CCSP (6:29)
28 Data Egress CCSP (4:41)
29 Domain 2 Summary CCSP (3:26)
Module 3 Cloud Platform and Infrastructure Security
1 Cloud Platform and Infrastructure Security CCSP (3:05)
2 Cloud Infrastructure Components CCSP (4:33)
3 The Management Plane CCSP (3:40)
4 Administering Middleware CCSP (4:50)
5 Virtualization CCSP (4:19)
6 Data Access CCSP (4:10)
7 Secure Networking CCSP (4:09)
8 Network Security CCSP (5:37)
9 System information and Event Management (SIEM) CCSP (5:25)
10 Cloud Provider Responsibility for Physical Plant CCSP (6:12)
11 Power Redundancy CCSP (5:50)
12 Other Redundancy and Safety Considerations CCSP (5:38)
13 Data Center Tiers CCSP (5:51)
14 Cloud Threats Part 1 CCSP (6:22)
15 Cloud Threats Part 2 CCSP (4:10)
16 Protecting Against Cloud Threats Part 1 CCSP (7:56)
17 Protecting Against Cloud Threats Part 2 CCSP (5:36)
18 Shared Responsibility for Cloud Platform Oversight CCSP (4:00)
19 Cloud-Based Business Continuity and Disaster Recovery CCSP (4:51)
20 Disaster Declaration CCSP (4:27)
21 Disaster Recovery Criteria CCSP (4:47)
22 Disaster Recovery Testing CCSP (4:58)
23 Domain 3 Summary CCSP (4:37)
Module 4 Cloud Application Security
1 Cloud Application Security CCSP (3:57)
2 Challenges of Cloud Application Deployment CCSP (7:02)
3 Training and Awareness CCSP (5:43)
4 Cloud Software Development Lifecycle (SDLC) CCSP (4:38)
5 Secure Software Development Lifecycle (SSDL) CCSP (5:42)
6 Application Security Standards CCSP (3:40)
7 Identity and Access Management (IAM) CCSP (6:03)
8 Multifactor Authentication (MFA) CCSP (5:21)
9 Single Sign-On and Federated Identity Management CCSP (5:41)
10 Federation Standards CCSP (3:27)
11 Application Programming Interfaces (APIs) CCSP (3:58)
12 API Approval and Management CCSP (4:37)
13 Open-Source Software CCSP (4:28)
14 Sandboxing CCSP (2:59)
15 Cloud Application Security Testing Concepts and Methods CCSP (4:00)
16 OWASP Top 10 CCSP (3:03)
17 OWASP Top 10 Part 1 - Code Injection CCSP (4:35)
18 OWASP Top Ten Part 2 - Broken Authentication CCSP (6:17)
19 OWASP Top 10 Part 3- Sensitive Data Exposure CCSP (5:06)
20 OWASP Top 10 Part 4- XML External Entities (XXE) CCSP (3:50)
21 OWASP Top 10 Part 5- Broken Access Control CCSP (3:14)
22 OWASP Top 10 Part 6- Security Misconfiguration CCSP (4:01)
23 OWASP Top 10 Part 7- Cross-Site Scripting (XSS) CCSP (3:19)
24 OWASP Top 10 Part 8- Insecure Deserialization CCSP (2:27)
25 OWASP Top 10 Part 9- Using Components with Known Vulnerabilities CCSP (3:34)
26 OWASP Top 10 Part 10- Insufficient Logging and Monitoring CCSP (4:31)
27 STRIDE CCSP (4:00)
28 Application Security Testing Approaches Part 1 CCSP (4:58)
29 Application Security Testing Approaches Part 2 CCSP (5:26)
30 Domain 4 Summary CCSP (4:45)
Module 5 Cloud Security Operations
1 Cloud Security Operations CCSP (3:30)
2 Change and Configuration Management CCSP (6:37)
3 Change Management CCSP (6:45)
4 Security Operations Center (SOC) CCSP (6:45)
5 Log Review Challenges CCSP (4:53)
6 Incident Response CCSP (6:17)
7 Treacherous 12 Part 1 CCSP (4:20)
8 Treacherous 12 Part 2- Data Breach CCSP (6:21)
9 Treacherous 12 Part 3- Insufficient Identity, Credential, and Access Management CCSP (5:23)
10 Treacherous 12 Part 4- Insure APIs CCSP (3:46)
11 Treacherous 12 Part 5- System Vulnerability CCSP (4:45)
12 Treacherous 12 Part 6- Account Hijacking CCSP (5:28)
13 Treacherous 12 Part 7- Malicious Insider CCSP (6:03)
14 Treacherous 12 Part 8- Advanced Persistent Threats (APTs) CCSP (6:19)
15 Treacherous 12 Part 9- Data Loss CCSP (4:58)
16 Treacherous 12 Part 10- Insufficient Due Diligence CCSP (5:08)
17 Treacherous 12 Part 11- Abuse of Cloud Services CCSP (3:39)
18 Treacherous 12 Part 12- Denial of Service CCSP (4:35)
19 Treacherous 12 Part 13- Shared Technology Vulnerability CCSP (4:30)
20 Domain 5 Summary CCSP (4:15)
Module 6 Legal, Risk, and Compliance
1 Legal, Risk and Compliance CCSP (5:00)
2 Legal Risks of Cloud Computing CCSP (6:05)
3 Due Diligence and Due Care CCSP (4:14)
4 Legal and Compliance Terms CCSP (4:34)
5 US Laws and Regulations CCSP (4:47)
6 Sarbanes-Oxley (SOX) CCSP (4:33)
7 Graham-Leach-Bliley Act (GLBA) CCSP (3:58)
8 Health Information Portability and Accountability Act (HIPAA) CCSP (4:46)
9 Payment Industry Card (PCI) CCSP (4:28)
10 General Data Protection Regulation (GDPR) CCSP (4:30)
11 GDPR Privacy Principles CCSP (4:45)
12 Risk Management CCSP (8:01)
13 Risk Management Frameworks CCSP (3:54)
14 Vendor Management CCSP (5:04)
15 Statement on Standards for Attestation Engagements (SSAE-18) CCSP (5:54)
16 Domain 6 Summary CCSP (3:42)
17 Conclusion CCSP (5:40)
Teach online with
15 Treacherous 12 Part 9- Data Loss CCSP
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock