Certified Cloud Security Professional
(CCSP-2018) / ISBN : 978-1-64459-027-0
Über diesen Kurs
Fähigkeiten, die Sie erwerben werden
Unterricht
12+ Unterricht | 81+ Übungen | 225+ Tests | 100+ Karteikarten | 100+ Glossar der Begriffe
Testvorbereitung
125+ Fragen vor der Beurteilung | 2+ Ausführliche Tests | 123+ Fragen nach der Bewertung | 171+ Testfragen zur Praxis
Praktische Übungen
31+ LiveLab | 21+ Videoanleitungen | 41+ Minutes
Introduction
- Overview of the CCSP Exam
- Notes on This Course's Organization
Architectural Concepts
- Business Requirements
- Cloud Evolution, Vernacular, and Definitions
- Cloud Computing Roles and Responsibilities
- Cloud Computing Definitions
- Foundational Concepts of Cloud Computing
- Summary
- Exam Essentials
- Written Labs
Design Requirements
- Business Requirements Analysis
- Boundaries of Cloud Models
- Design Principles for Protecting Sensitive Data
- Summary
- Exam Essentials
- Written Labs
Data Classification
- Data Inventory and Discovery
- Jurisdictional Requirements
- Data Rights Management
- Data Control
- Summary
- Exam Essentials
- Written Labs
Cloud Data Security
- Cloud Data Life Cycle
- Cloud Storage Architectures
- Cloud Data Security Foundational Strategies
- Summary
- Exam Essentials
- Written Labs
Security in the Cloud
- Shared Cloud Platform Risks and Responsibilities
- Cloud Computing Risks by Deployment and Service Model
- Virtualization
- Cloud Attack Surface
- Disaster Recovery (DR) and Business Continuity Management (BCM)
- Summary
- Exam Essentials
- Written Labs
Responsibilities in the Cloud
- Foundations of Managed Services
- Business Requirements
- Shared Responsibilities by Service Type
- Shared Administration of OS, Middleware, or Applications
- Share Responsibilities: Data Access
- Lack of Physical Access
- Summary
- Exam Essentials
- Written Labs
Cloud Application Security
- Training and Awareness
- Cloud-Secure Software Development Life Cycle (SDLC)
- ISO/IEC 27034-1 Standards for Secure Application Development
- Identity and Access Management (IAM)
- Cloud Application Architecture
- Cloud Application Assurance and Validation
- Summary
- Exam Essentials
- Written Labs
Operations Elements
- Physical/Logical Operations
- Security Training and Awareness
- Basic Operational Application Security
- Summary
- Exam Essentials
- Written Labs
Operations Management
- Monitoring, Capacity, and Maintenance
- Change and Configuration Management (CM)
- Business Continuity and Disaster Recovery (BC/DR)
- Summary
- Exam Essentials
- Written Labs
Legal and Compliance Part 1
- Legal Requirements and Unique Risks in the Cloud Environment
- Potential Personal and Data Privacy Issues in the Cloud Environment
- Audit Processes, Methodologies, and Cloud Adaptations
- Summary
- Exam Essentials
- Written Labs
Legal and Compliance Part 2
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Business Requirements
- Cloud Contract Design and Management for Outsourcing
- Identifying Appropriate Supply Chain and Vendor Management Processes
- Summary
- Exam Essentials
- Written Labs
Architectural Concepts
- Capturing Network Traffic
- Installing Ubuntu Using Hyper-V Manager
- Using a Symmetric Algorithm
- Using an Asymmetric Algorithm
Design Requirements
- Performing Active Scanning using Nmap
- Creating a DMZ Zone
Data Classification
- Displaying Metadata Information
- Enabling Access Control List
- Standard Access Control List
- Extended Access Control List
Cloud Data Security
- Building IPSec VPN using ubuntu
- Generating a Symmetric key
- Generating an Asymmetric key
- Observe an MD5-Generated Hash Value
- Observe an SHA-Generated Hash Value
Security in the Cloud
- Performing DoS Attacks with SYN Flood
- Performing a MITM Attack
- Using Social Engineering to Plan an Attack
Responsibilities in the Cloud
- Setup Honeypot on Kali Linux
- Enabling an Intrustion Detection Policy
- Removing Unnecessary Services
Cloud Application Security
- Authorization of an User
- Examining File Permissions
- Cross-site request forgery with low complexity
- Reviewing the Top 10 OWASP Attacks
- Attacking a website using XSS injection
- Conducting IP Spoofing
Operations Management
- Verify RAM Usage
- Checking Disk Capacity
- Using MBSA
Legal and Compliance Part 1
- Complete Chain of Custody
Warum lieben Lernende diesen Kurs?
Haben Sie Fragen? Schauen Sie sich die FAQs an
Sie haben noch unbeantwortete Fragen und möchten Kontakt aufnehmen?
Kontaktiere uns jetztUm sich für diese Cybersicherheits-Zertifizierung zu qualifizieren, müssen Sie die Prüfung bestehen und über mindestens fünf Jahre kumulative, bezahlte Berufserfahrung in der Informationstechnologie verfügen, davon drei Jahre im Bereich Informationssicherheit und ein Jahr in einem oder mehreren der sechs Bereiche des (ISC)² CCSP Common Body of Knowledge (CBK).
EUR 599
Multiple Choice
Die Prüfung umfasst 125 Fragen.
180 Minuten
700
Für den Fall, dass Sie Ihren ersten Versuch zur Bestehen der CCSP-Zertifizierung nicht bestehen, gelten bei ISC2 folgende Wiederholungsrichtlinien:
- Kandidaten, die die Prüfung beim ersten Anlauf nicht bestehen, können sie nach 30 Tagen wiederholen.
- Kandidaten, die ein zweites Mal durchfallen, müssen 90 Tage warten, bevor sie die Prüfung erneut ablegen können.
- Wenn ein Kandidat beim dritten Mal durchfällt, ist der nächste verfügbare Termin zur Prüfung 180 Tage nach dem letzten Prüfungsversuch.
Drei Jahre