BENEFITS
Best Seller
Online Courses
24/7 Support
Lifetime Access
Get Certificate
Offer Curriculum
Available in
days
days
after you enroll
- 1 Introduction CCSP (8:08)
- 2 Cloud Concepts, Architecture and Design CCSP (4:30)
- 3 What is Cloud Computing- CCSP (4:31)
- 4 Roles in Cloud Computing CCSP (5:23)
- 5 Cloud Security Concepts CCSP (5:28)
- 6 Cloud Service Models CCSP (5:21)
- 7 Infrastructure as a Service (IaaS) CCSP (5:03)
- 8 IaaS Specific Risks CCSP (5:44)
- 10 PaaS Risks CCSP (3:51)
- 11 Software as a Service (SaaS) CCSP (4:18)
- 12 SaaS Risks CCSP (6:00)
- 13 Virtualization Risks CCSP (5:45)
- 14 Cloud Deployment Models CCSP (5:05)
- 15 Public Cloud Deployment CCSP (4:00)
- 16 Public Cloud Deployment Risks CCSP (6:53)
- 17 Vendor Lock-In CCSP (4:51)
- 18 Vendor Lock-Out CCSP (4:25)
- 19 Multitenant Environment Risks CCSP (3:51)
- 20 Private Cloud Deployments CCSP (3:36)
- 21 Private Cloud Deployment Risks CCSP (6:41)
- 22 Community Cloud Deployments CCSP (4:20)
- 23 Community Cloud Deployment Risks CCSP (3:58)
- 24 Cloud Security Process CCSP (7:05)
- 25 Security Responsibility by Service Model CCSP (6:39)
- 26 Defense In Depth CCSP (6:45)
- 27 Cloud Security Frameworks and Standards CCSP (5:39)
- 28 Cost Benefit Analysis CCSP (6:25)
- 29 Developing Business Requirements CCSP (5:48)
- 30 Business impact Analysis CCSP (7:52)
- 31 Developing Security Requirements CCSP (5:10)
- 32 Domain 1 Summary CCSP (4:33)
Available in
days
days
after you enroll
- 1 Cloud Data Security and Data Classification CCSP (3:20)
- 2 Data Classification CCSP (5:48)
- 3 Data Roles CCSP (5:37)
- 4 Cloud Data Lifecycle CCSP (4:50)
- 5 Data Discovery CCSP (4:40)
- 6 Cloud Data Security Strategies CCSP (3:55)
- 7 Encrypting Data CCSP (5:42)
- 8 Encryption Types CCSP (5:12)
- 9 Encryption and Key Management CCSP (6:19)
- 10 Federal Information Processing Standard CCSP (3:41)
- 11 Hardening Devices CCSP (6:50)
- 12 Jurisdiction Requirements CCSP (4:16)
- 13 Protecting Data in Transit CCSP (3:39)
- 14 Data Storage Architecture CCSP (6:44)
- 15 Data Retention Policy CCSP (5:28)
- 16 Data Destruction Methods CCSP (4:29)
- 17 Auditability, Traceability and Accountability CCSP (6:39)
- 18 Data Audit Policy CCSP (6:18)
- 19 Data Privacy CCSP (6:14)
- 20 Privacy Safeguards CCSP (5:07)
- 21 Data Obfuscation CCSP (5:45)
- 22 Data Masking CCSP (3:41)
- 23 Tokenization CCSP (3:44)
- 24 Information Rights Management (IRM) CCSP (4:13)
- 25 Information Rights Implementation CCSP (5:13)
- 26 Information Rights Challenges CCSP (5:22)
- 27 Intellectual Property (US) CCSP (6:29)
- 28 Data Egress CCSP (4:41)
- 29 Domain 2 Summary CCSP (3:26)
Available in
days
days
after you enroll
- 1 Cloud Platform and Infrastructure Security CCSP (3:05)
- 2 Cloud Infrastructure Components CCSP (4:33)
- 3 The Management Plane CCSP (3:40)
- 4 Administering Middleware CCSP (4:50)
- 5 Virtualization CCSP (4:19)
- 6 Data Access CCSP (4:10)
- 7 Secure Networking CCSP (4:09)
- 8 Network Security CCSP (5:37)
- 9 System information and Event Management (SIEM) CCSP (5:25)
- 10 Cloud Provider Responsibility for Physical Plant CCSP (6:12)
- 11 Power Redundancy CCSP (5:50)
- 12 Other Redundancy and Safety Considerations CCSP (5:38)
- 13 Data Center Tiers CCSP (5:51)
- 14 Cloud Threats Part 1 CCSP (6:22)
- 15 Cloud Threats Part 2 CCSP (4:10)
- 16 Protecting Against Cloud Threats Part 1 CCSP (7:56)
- 17 Protecting Against Cloud Threats Part 2 CCSP (5:36)
- 18 Shared Responsibility for Cloud Platform Oversight CCSP (4:00)
- 19 Cloud-Based Business Continuity and Disaster Recovery CCSP (4:51)
- 20 Disaster Declaration CCSP (4:27)
- 21 Disaster Recovery Criteria CCSP (4:47)
- 22 Disaster Recovery Testing CCSP (4:58)
- 23 Domain 3 Summary CCSP (4:37)
Available in
days
days
after you enroll
- 1 Cloud Application Security CCSP (3:57)
- 2 Challenges of Cloud Application Deployment CCSP (7:02)
- 3 Training and Awareness CCSP (5:43)
- 4 Cloud Software Development Lifecycle (SDLC) CCSP (4:38)
- 5 Secure Software Development Lifecycle (SSDL) CCSP (5:42)
- 6 Application Security Standards CCSP (3:40)
- 7 Identity and Access Management (IAM) CCSP (6:03)
- 8 Multifactor Authentication (MFA) CCSP (5:21)
- 9 Single Sign-On and Federated Identity Management CCSP (5:41)
- 10 Federation Standards CCSP (3:27)
- 11 Application Programming Interfaces (APIs) CCSP (3:58)
- 12 API Approval and Management CCSP (4:37)
- 13 Open-Source Software CCSP (4:28)
- 14 Sandboxing CCSP (2:59)
- 15 Cloud Application Security Testing Concepts and Methods CCSP (4:00)
- 16 OWASP Top 10 CCSP (3:03)
- 17 OWASP Top 10 Part 1 - Code Injection CCSP (4:35)
- 18 OWASP Top Ten Part 2 - Broken Authentication CCSP (6:17)
- 19 OWASP Top 10 Part 3- Sensitive Data Exposure CCSP (5:06)
- 20 OWASP Top 10 Part 4- XML External Entities (XXE) CCSP (3:50)
- 21 OWASP Top 10 Part 5- Broken Access Control CCSP (3:14)
- 22 OWASP Top 10 Part 6- Security Misconfiguration CCSP (4:01)
- 23 OWASP Top 10 Part 7- Cross-Site Scripting (XSS) CCSP (3:19)
- 24 OWASP Top 10 Part 8- Insecure Deserialization CCSP (2:27)
- 25 OWASP Top 10 Part 9- Using Components with Known Vulnerabilities CCSP (3:34)
- 26 OWASP Top 10 Part 10- Insufficient Logging and Monitoring CCSP (4:31)
- 27 STRIDE CCSP (4:00)
- 28 Application Security Testing Approaches Part 1 CCSP (4:58)
- 29 Application Security Testing Approaches Part 2 CCSP (5:26)
- 30 Domain 4 Summary CCSP (4:45)
Available in
days
days
after you enroll
- 1 Cloud Security Operations CCSP (3:30)
- 2 Change and Configuration Management CCSP (6:37)
- 3 Change Management CCSP (6:45)
- 4 Security Operations Center (SOC) CCSP (6:45)
- 5 Log Review Challenges CCSP (4:53)
- 6 Incident Response CCSP (6:17)
- 7 Treacherous 12 Part 1 CCSP (4:20)
- 8 Treacherous 12 Part 2- Data Breach CCSP (6:21)
- 9 Treacherous 12 Part 3- Insufficient Identity, Credential, and Access Management CCSP (5:23)
- 10 Treacherous 12 Part 4- Insure APIs CCSP (3:46)
- 11 Treacherous 12 Part 5- System Vulnerability CCSP (4:45)
- 12 Treacherous 12 Part 6- Account Hijacking CCSP (5:28)
- 13 Treacherous 12 Part 7- Malicious Insider CCSP (6:03)
- 14 Treacherous 12 Part 8- Advanced Persistent Threats (APTs) CCSP (6:19)
- 15 Treacherous 12 Part 9- Data Loss CCSP (4:58)
- 16 Treacherous 12 Part 10- Insufficient Due Diligence CCSP (5:08)
- 17 Treacherous 12 Part 11- Abuse of Cloud Services CCSP (3:39)
- 18 Treacherous 12 Part 12- Denial of Service CCSP (4:35)
- 19 Treacherous 12 Part 13- Shared Technology Vulnerability CCSP (4:30)
- 20 Domain 5 Summary CCSP (4:15)
Available in
days
days
after you enroll
- 1 Legal, Risk and Compliance CCSP (5:00)
- 2 Legal Risks of Cloud Computing CCSP (6:05)
- 3 Due Diligence and Due Care CCSP (4:14)
- 4 Legal and Compliance Terms CCSP (4:34)
- 5 US Laws and Regulations CCSP (4:47)
- 6 Sarbanes-Oxley (SOX) CCSP (4:33)
- 7 Graham-Leach-Bliley Act (GLBA) CCSP (3:58)
- 8 Health Information Portability and Accountability Act (HIPAA) CCSP (4:46)
- 9 Payment Industry Card (PCI) CCSP (4:28)
- 10 General Data Protection Regulation (GDPR) CCSP (4:30)
- 11 GDPR Privacy Principles CCSP (4:45)
- 12 Risk Management CCSP (8:01)
- 13 Risk Management Frameworks CCSP (3:54)
- 14 Vendor Management CCSP (5:04)
- 15 Statement on Standards for Attestation Engagements (SSAE-18) CCSP (5:54)
- 16 Domain 6 Summary CCSP (3:42)
- 17 Conclusion CCSP (5:40)
Limited-Time Halloween Offer