Table of contents
Getting Started
0mins
Lock icon
About the Author | 0m
Lock icon
About the Course | 0m
Lock icon
Course Prerequisites | 0m
Cloud Computing Concepts
0mins
Lock icon
Roles, Characteristics and Building Block Technologies | 0m
Cloud Reference Architecture
180mins
Lock icon
Cloud Computing Activities and Service Categories | 0m
Lock icon
Cloud Deployment Models | 0m
Lock icon
Cloud Shared Considerations | 0m
Lock icon
Impact of Related Technologies | 0m
Lock icon
Lab Preparation Video (Important) | 0m
Lock icon
Access and Tour the AWS ConsoleAccess and Tour the AWS Console | 1h 0m
Lock icon
Introduction to EC2Introduction to EC2 | 1h 0m
Lock icon
Create a Windows EC2 Instance and Connect using Remote Desktop Protocol (RDP)Create a Windows EC2 Instance and Connect using Remote Desktop Protocol (RDP) | 1h 0m
Cloud Security Concepts
90mins
Lock icon
Cryptography and Key Management | 0m
Lock icon
Data and Media Sanitization | 0m
Lock icon
Access Control | 0m
Lock icon
Network Security and Virtualization Security | 0m
Lock icon
Common Threats | 0m
Lock icon
Introduction to AWS Identity and Access Management (IAM)Introduction to AWS Identity and Access Management (IAM) | 1h 30m
Design Principles
0mins
Lock icon
Secure Cloud Data Lifecycle | 0m
Lock icon
Cloud-Based Disaster Recovery (DR) and Business Continuity (BC) | 0m
Lock icon
Cost-Benefit Analysis | 0m
Lock icon
Functional Security Requirements | 0m
Lock icon
Security Considerations for Different Cloud Categories | 0m
Evaluate Cloud Service Providers
0mins
Lock icon
Verification Against Criteria | 0m
Lock icon
System and Subsystem Product Certifications | 0m
Describe Cloud Data Concepts
0mins
Lock icon
Cloud Data Lifecycle Phases | 0m
Lock icon
Data Dispersion | 0m
Design and Implement Cloud Data Storage Architecture
45mins
Lock icon
Storage Types | 0m
Lock icon
Threats to Storage Types | 0m
Lock icon
Creating Amazon S3 Buckets, Managing Objects, and Enabling Versioning Creating Amazon S3 Buckets, Managing Objects, and Enabling Versioning | 45m
Design and Apply Data Security Technologies and Strategies
0mins
Lock icon
Encryption and Key Management | 0m
Lock icon
Hashing, Masking, and Obfuscation | 0m
Lock icon
Tokenization | 0m
Lock icon
Data Loss Prevention (DLP) | 0m
Lock icon
Data De-identification | 0m
Implement Data Discovery and Classification
0mins
Lock icon
Structured and Unstructured Data | 0m
Lock icon
Mapping, Labeling, and Sensitive Data | 0m
Design and Implement Information Rights Management
0mins
Lock icon
IRM Objectives and Tools | 0m
Plan and Implement Data Retention, Deletion, and Archival Policies
45mins
Lock icon
Data Retention Policies | 0m
Lock icon
Data Deletion Procedures and Mechanisms | 0m
Lock icon
Data Archival Procedures and Mechanisms | 0m
Lock icon
Legal Hold | 0m
Lock icon
Creating a Basic Amazon S3 Lifecycle PolicyCreating a Basic Amazon S3 Lifecycle Policy | 45m
Design and Implement Auditability, Traceability, and Accountability of Data Events
0mins
Lock icon
Definition of Event Sources and Requirements | 0m
Lock icon
Logging, Storage, and Analysis of Data Events | 0m
Lock icon
Chain of Custody and Non-Repudiation | 0m
Cloud Infrastructure Components
0mins
Lock icon
Physical Environment | 0m
Lock icon
Network and Communications | 0m
Lock icon
Compute and Virtualization | 0m
Lock icon
Storage and Management Plane | 0m
Design a Secure Datacenter
0mins
Lock icon
Logical Design | 0m
Lock icon
Physical Design | 0m
Lock icon
Environmental Design | 0m
Analyze Risks Associated with Cloud Infrastructure
0mins
Lock icon
Risk Assessment and Analysis | 0m
Lock icon
Cloud Vulnerabilities, Risks, Threats, and Attacks | 0m
Lock icon
Countermeasure Strategies | 0m
Design and Plan Security Controls
0mins
Lock icon
Physical and Environmental Protection | 0m
Lock icon
System and Communication Protection | 0m
Lock icon
Identification, Authentication, and Authorization in Cloud Infrastructure | 0m
Lock icon
Audit Mechanisms | 0m
Plan Disaster Recovery (DR) and Business Continuity (BC)
0mins
Lock icon
Risks Related to the Cloud Environment | 0m
Lock icon
Business Requirements | 0m
Lock icon
Business Continuity/Disaster Recovery Strategy | 0m
Lock icon
Creating a BCDR Plan | 0m
Lock icon
Testing a BCDR Plan | 0m
Advocate Training and Awareness for Application Security
0mins
Lock icon
Cloud Development Basics | 0m
Lock icon
Common Pitfalls and Vulnerabilities | 0m
Describe the Secure Software Development Life Cycle (SDLC) Process
0mins
Lock icon
Business Requirements and Phases/Methodologies | 0m
Apply the Secure Software Development Life Cycle (SDLC)
0mins
Lock icon
Avoid Common Vulnerabilities During Development | 0m
Lock icon
Cloud-Specific Risks and Quality Assurance | 0m
Lock icon
Threat Modeling and Configuration Management | 0m
Apply Cloud Software Assurance and Validation
0mins
Lock icon
Functional Testing and Security Testing Methodologies | 0m
Use Verified Secure Software
0mins
Lock icon
Approved APIs and Third-Party Software | 0m
Comprehend the Specifics of Cloud Application Architecture
60mins
Lock icon
Supplemental Security Components | 0m
Lock icon
Cryptography | 0m
Lock icon
Sandboxing and Application Virtualization | 0m
Lock icon
AWS Security Essentials - KMS Integration with S3AWS Security Essentials - KMS Integration with S3 | 1h 0m
Design Appropriate Identity and Access Management (IAM) Solutions
0mins
Lock icon
Federated Identity and Identity Providers | 0m
Lock icon
Single Sign-On (SSO) and Multi-Factor Authentication (MFA) | 0m
Lock icon
Cloud Access Security Broker (CASB) | 0m
Implement and Build Physical and Logical Infrastructure for a Cloud Environment
0mins
Lock icon
Hardware-Specific Security Configuration Requirements | 0m
Lock icon
Virtualization Management Toolsets | 0m
Operate Physical and Logical Infrastructure for the Cloud Environment
0mins
Lock icon
Configure Access Control for Local and Remote Access | 0m
Lock icon
Secure Network Configuration | 0m
Lock icon
Operating System (OS) Hardening through the Application of Baselines | 0m
Lock icon
Stand-Alone Hosts | 0m
Lock icon
Availability of Clustered Hosts and Guest OSs | 0m
Manage Physical and Logical Infrastructure for the Cloud Environment
0mins
Lock icon
Access Controls for Remote Access | 0m
Lock icon
Patch Management | 0m
Lock icon
Performance, Capacity, and Hardware Monitoring | 0m
Lock icon
Backup and Restore Functions | 0m
Lock icon
Network Security Controls and Management Plane | 0m
Implement Operational Controls and Standards
0mins
Lock icon
Change and Continuity Management | 0m
Lock icon
Information Security and Incident Management | 0m
Lock icon
Problem and Deployment Management | 0m
Lock icon
Additional Operational Management | 0m
Support Digital Forensics
0mins
Lock icon
Forensic Data Collection Methodologies | 0m
Lock icon
Evidence Management | 0m
Manage Communication with Relevant Parties
0mins
Lock icon
Managing Communications | 0m
Manage Security Operations
0mins
Lock icon
Security Operations Center (SOC) and Monitoring Security Controls | 0m
Lock icon
Log Capture and Analysis | 0m
Lock icon
Incident Management | 0m
Articulate Legal Requirements and Unique Risks with the Cloud Environment
0mins
Lock icon
Conflicting International Legislation | 0m
Lock icon
Legal Risks Specific to Cloud Computing | 0m
Lock icon
Legal Frameworks and Guidelines | 0m
Lock icon
eDiscovery | 0m
Lock icon
Forensics Requirements | 0m
Understand Privacy Issues
0mins
Lock icon
Contractual vs. Regulated Private Data | 0m
Lock icon
Country-Specific Legislation Related to Private Data | 0m
Lock icon
Jurisdictional Differences and Standard Privacy Requirements | 0m
Understand Audit Processes, Methodologies, and Required Adaptations for a Cloud Environment
0mins
Lock icon
Audit Controls and Requirements | 0m
Lock icon
Assurance Challenges of Virtualization and Cloud | 0m
Lock icon
Types of Audit Reports | 0m
Lock icon
Restrictions of Audit Scope Statements | 0m
Lock icon
Gap Analysis and Audit Planning | 0m
Lock icon
Internal Security Management System (ISMS) | 0m
Lock icon
Policies and Involvement of Relevant Stakeholders | 0m
Lock icon
Specialized Compliance Requirements for Highly Regulated Industries | 0m
Lock icon
Impact of Distributed Information Technology (IT) Model | 0m
Understand the Implications of Cloud-to-Enterprise Risk Management
0mins
Lock icon
Assess Providers' Risk Management Programs | 0m
Lock icon
Data Owner/Controller vs. Data Custodian/Processor | 0m
Lock icon
Regulatory Transparency Requirements | 0m
Lock icon
Risk Treatment and Frameworks | 0m
Lock icon
Metrics for Risk Management | 0m
Lock icon
Assessment of Risk Environment | 0m
Understand Outsourcing and Cloud Contract Design
0mins
Lock icon
Business Requirements | 0m
Lock icon
Vendor Management | 0m
Lock icon
Contract Management | 0m
Lock icon
Supply Chain Management | 0m
Next Steps
180mins
Lock icon
How to Prepare for the Exam | 0m
Lock icon
What's Next After Certification | 0m
Lock icon
CCSPCCSP | 3h 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon