(ISC)2 Certified Cloud Security Professional (CCSP)
(CCSP.AE2) / ISBN : 978-1-64459-407-0
Fähigkeiten, die Sie erwerben werden
Unterricht
11+ Unterricht | 652+ Übungen | 200+ Tests | 364+ Karteikarten | 251+ Glossar der Begriffe
Testvorbereitung
150+ Fragen vor der Beurteilung | 2+ Ausführliche Tests | 150+ Fragen nach der Bewertung | 300+ Testfragen zur Praxis
Praktische Übungen
25+ LiveLab | 25+ Videoanleitungen | 57+ Minutes
Introduction
- CCSP Certification
- Taking the CCSP Exam
- Computer-Based Testing Environment
- Exam Retake Policy
- Work Experience Requirement
- Recertification Requirements
- What Does This Course Cover?
- CCSP Exam Objectives
- CCSP Certification Exam Objective Map
Architectural Concepts
- Cloud Characteristics
- Business Requirements
- Cloud Computing Service Categories
- Cloud Deployment Models
- Multitenancy
- Cloud Computing Roles and Responsibilities
- Cloud Computing Reference Architecture
- Virtualization
- Cloud Shared Considerations
- Emerging Technologies
- Summary
- Exam Essentials
Data Classification
- Data Inventory and Discovery
- Information Rights Management
- Data Control
- Summary
- Exam Essentials
Cloud Data Security
- Cloud Data Lifecycle
- Cloud Storage Architectures
- Threats to Cloud Storage
- Designing and Applying Security Strategies for Storage
- Summary
- Exam Essentials
Security in the Cloud
- Shared Cloud Platform Risks and Responsibilities
- Cloud Computing Risks by Deployment Model
- Cloud Computing Risks by Service Model
- Virtualization
- Disaster Recovery (DR) and Business Continuity (BC)
- Cloud Design Patterns
- Summary
- Exam Essentials
Cloud Platform, Infrastructure, and Operational Security
- Foundations of Managed Services
- Shared Responsibilities by Service Type
- Securing Communications and Infrastructure
- Securing Hardware and Compute
- Securing Software
- Managing Virtual Systems
- Assessing Vulnerabilities
- Securing the Management Plane
- Auditing Your Environment and Provider
- Summary
- Exam Essentials
Cloud Application Security
- Developing Software for the Cloud
- Cloud Application Architecture
- Cloud-Secure Software Development Lifecycle (SDLC)
- Cloud Application Assurance and Validation
- Identity and Access Management
- Summary
- Exam Essentials
Operations Elements
- Designing a Secure Data Center
- Managing Security Operations
- Summary
- Exam Essentials
Operations Management
- Monitoring, Capacity, and Maintenance
- Change and Configuration Management
- Problem and Incident Management
- IT Service Management and Continual Service Improvement
- Business Continuity and Disaster Recovery
- Summary
- Exam Essentials
Legal and Compliance Issues
- Legal Requirements and Unique Risks in the Cloud Environment
- Analyzing a Law
- Legal Liability
- Torts and Negligence
- U.S. Privacy and Security Laws
- International Laws
- Laws, Regulations, and Standards
- Information Security Management Systems
- Privacy in the Cloud
- Cloud Forensics
- Audit Processes, Methodologies, and Cloud Adaptations
- Summary
- Exam Essentials
Cloud Vendor Management
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Security Policy Framework
- Enterprise Risk Management
- Risk Treatment and Response
- Risk Analysis
- Cloud Contract Design
- Government Cloud Standards
- Manage Communication with Relevant Parties
- Summary
- Exam Essentials
Architectural Concepts
- Creating a Virtual Machine and Installing Ubuntu Using Hyper-V Manager
Data Classification
- Displaying Metadata Information
- Capturing Network Traffic
Cloud Data Security
- Taking an Incremental Backup
- Taking a Full Backup
- Creating an Amazon S3 Glacier Vault
- Observing an MD5-Generated Hash Value
- Observing an SHA256-Generated Hash Value
- Creating a CloudWatch Dashboard and Adding a Metric to it
Security in the Cloud
- Performing a MITM Attack
- Using Social Engineering Techniques to Plan an Attack
Cloud Platform, Infrastructure, and Operational Security
- Configuring a Firewall for Inbound Rules
- Einrichten eines Honeypots unter Kali Linux
- Enabling an Access Control List
- Creating a VPC
- Creating a Network ACL
- Konfigurieren ausgehender Regeln für eine Firewall
- Creating an Elastic Load Balancer
- Creating a NAT Gateway
Cloud Application Security
- Configuring a Proxy Server
- Durchführen von IP-Spoofing
- Conducting Cross-site Request Forgery (CSRF or XSRF) Attacks
- Attacking a Website Using Cross-Site Scripting (XSS) Injection
Legal and Compliance Issues
- Completing the Chain of Custody
Cloud Vendor Management
- Simulating the DDoS Attack