Why Choose Us?

  • Best Seller

  • Online Courses

  • 24/7 Support

  • Lifetime Access

  • Get Certificate

Course curriculum

    1. 11 Introduction CCSP

    2. 12 Cloud Concepts, Architecture and Design CCSP

    3. 13 What is Cloud Computing- CCSP

    4. 14 Roles in Cloud Computing CCSP

    5. 15 Cloud Security Concepts CCSP

    6. 16 Cloud Service Models CCSP

    7. 17 Infrastructure as a Service (IaaS) CCSP

    8. 18 IaaS Specific Risks CCSP

    9. 110 PaaS Risks CCSP

    10. 111 Software as a Service (SaaS) CCSP

    11. 112 SaaS Risks CCSP

    12. 113 Virtualization Risks CCSP

    13. 114 Cloud Deployment Models CCSP

    14. 115 Public Cloud Deployment CCSP

    15. 116 Public Cloud Deployment Risks CCSP

    16. 117 Vendor Lock-In CCSP

    17. 118 Vendor Lock-Out CCSP

    18. 119 Multitenant Environment Risks CCSP

    19. 120 Private Cloud Deployments CCSP

    20. 121 Private Cloud Deployment Risks CCSP

    21. 122 Community Cloud Deployments CCSP

    22. 123 Community Cloud Deployment Risks CCSP

    23. 124 Cloud Security Process CCSP

    24. 125 Security Responsibility by Service Model CCSP

    25. 126 Defense In Depth CCSP

    26. 127 Cloud Security Frameworks and Standards CCSP

    27. 128 Cost Benefit Analysis CCSP

    28. 129 Developing Business Requirements CCSP

    29. 130 Business impact Analysis CCSP

    30. 131 Developing Security Requirements CCSP

    31. 132 Domain 1 Summary CCSP

    1. 21 Cloud Data Security and Data Classification CCSP

    2. 22 Data Classification CCSP

    3. 23 Data Roles CCSP

    4. 24 Cloud Data Lifecycle CCSP

    5. 25 Data Discovery CCSP

    6. 26 Cloud Data Security Strategies CCSP

    7. 27 Encrypting Data CCSP

    8. 28 Encryption Types CCSP

    9. 29 Encryption and Key Management CCSP

    10. 210 Federal Information Processing Standard CCSP

    11. 211 Hardening Devices CCSP

    12. 212 Jurisdiction Requirements CCSP

    13. 213 Protecting Data in Transit CCSP

    14. 214 Data Storage Architecture CCSP

    15. 215 Data Retention Policy CCSP

    16. 216 Data Destruction Methods CCSP

    17. 217 Auditability, Traceability and Accountability CCSP

    18. 218 Data Audit Policy CCSP

    19. 219 Data Privacy CCSP

    20. 220 Privacy Safeguards CCSP

    21. 221 Data Obfuscation CCSP

    22. 222 Data Masking CCSP

    23. 223 Tokenization CCSP

    24. 224 Information Rights Management (IRM) CCSP

    25. 225 Information Rights Implementation CCSP

    26. 226 Information Rights Challenges CCSP

    27. 227 Intellectual Property (US) CCSP

    28. 228 Data Egress CCSP

    29. 229 Domain 2 Summary CCSP

    1. 31 Cloud Platform and Infrastructure Security CCSP

    2. 32 Cloud Infrastructure Components CCSP

    3. 33 The Management Plane CCSP

    4. 34 Administering Middleware CCSP

    5. 35 Virtualization CCSP

    6. 36 Data Access CCSP

    7. 37 Secure Networking CCSP

    8. 38 Network Security CCSP

    9. 39 System information and Event Management (SIEM) CCSP

    10. 310 Cloud Provider Responsibility for Physical Plant CCSP

    11. 311 Power Redundancy CCSP

    12. 312 Other Redundancy and Safety Considerations CCSP

    13. 313 Data Center Tiers CCSP

    14. 314 Cloud Threats Part 1 CCSP

    15. 315 Cloud Threats Part 2 CCSP

    16. 316 Protecting Against Cloud Threats Part 1 CCSP

    17. 317 Protecting Against Cloud Threats Part 2 CCSP

    18. 318 Shared Responsibility for Cloud Platform Oversight CCSP

    19. 319 Cloud-Based Business Continuity and Disaster Recovery CCSP

    20. 320 Disaster Declaration CCSP

    21. 321 Disaster Recovery Criteria CCSP

    22. 322 Disaster Recovery Testing CCSP

    23. 323 Domain 3 Summary CCSP

    1. 41 Cloud Application Security CCSP

    2. 42 Challenges of Cloud Application Deployment CCSP

    3. 43 Training and Awareness CCSP

    4. 44 Cloud Software Development Lifecycle (SDLC) CCSP

    5. 45 Secure Software Development Lifecycle (SSDL) CCSP

    6. 46 Application Security Standards CCSP

    7. 47 Identity and Access Management (IAM) CCSP

    8. 48 Multifactor Authentication (MFA) CCSP

    9. 49 Single Sign-On and Federated Identity Management CCSP

    10. 410 Federation Standards CCSP

    11. 411 Application Programming Interfaces (APIs) CCSP

    12. 412 API Approval and Management CCSP

    13. 413 Open-Source Software CCSP

    14. 414 Sandboxing CCSP

    15. 415 Cloud Application Security Testing Concepts and Methods CCSP

    16. 416 OWASP Top 10 CCSP

    17. 417 OWASP Top 10 Part 1 - Code Injection CCSP

    18. 418 OWASP Top Ten Part 2 - Broken Authentication CCSP

    19. 419 OWASP Top 10 Part 3- Sensitive Data Exposure CCSP

    20. 420 OWASP Top 10 Part 4- XML External Entities (XXE) CCSP

    21. 421 OWASP Top 10 Part 5- Broken Access Control CCSP

    22. 422 OWASP Top 10 Part 6- Security Misconfiguration CCSP

    23. 423 OWASP Top 10 Part 7- Cross-Site Scripting (XSS) CCSP

    24. 424 OWASP Top 10 Part 8- Insecure Deserialization CCSP

    25. 425 OWASP Top 10 Part 9- Using Components with Known Vulnerabilities CCSP

    26. 426 OWASP Top 10 Part 10- Insufficient Logging and Monitoring CCSP

    27. 427 STRIDE CCSP

    28. 428 Application Security Testing Approaches Part 1 CCSP

    29. 429 Application Security Testing Approaches Part 2 CCSP

    30. 430 Domain 4 Summary CCSP

    1. 51 Cloud Security Operations CCSP

    2. 52 Change and Configuration Management CCSP

    3. 53 Change Management CCSP

    4. 54 Security Operations Center (SOC) CCSP

    5. 55 Log Review Challenges CCSP

    6. 56 Incident Response CCSP

    7. 57 Treacherous 12 Part 1 CCSP

    8. 58 Treacherous 12 Part 2- Data Breach CCSP

    9. 59 Treacherous 12 Part 3- Insufficient Identity, Credential, and Access Management CCSP

    10. 510 Treacherous 12 Part 4- Insure APIs CCSP

    11. 511 Treacherous 12 Part 5- System Vulnerability CCSP

    12. 512 Treacherous 12 Part 6- Account Hijacking CCSP

    13. 513 Treacherous 12 Part 7- Malicious Insider CCSP

    14. 514 Treacherous 12 Part 8- Advanced Persistent Threats (APTs) CCSP

    15. 515 Treacherous 12 Part 9- Data Loss CCSP

    16. 516 Treacherous 12 Part 10- Insufficient Due Diligence CCSP

    17. 517 Treacherous 12 Part 11- Abuse of Cloud Services CCSP

    18. 518 Treacherous 12 Part 12- Denial of Service CCSP

    19. 519 Treacherous 12 Part 13- Shared Technology Vulnerability CCSP

    20. 520 Domain 5 Summary CCSP

    1. 61 Legal, Risk and Compliance CCSP

    2. 62 Legal Risks of Cloud Computing CCSP

    3. 63 Due Diligence and Due Care CCSP

    4. 64 Legal and Compliance Terms CCSP

    5. 65 US Laws and Regulations CCSP

    6. 66 Sarbanes-Oxley (SOX) CCSP

    7. 67 Graham-Leach-Bliley Act (GLBA) CCSP

    8. 68 Health Information Portability and Accountability Act (HIPAA) CCSP

    9. 69 Payment Industry Card (PCI) CCSP

    10. 610 General Data Protection Regulation (GDPR) CCSP

    11. 611 GDPR Privacy Principles CCSP

    12. 612 Risk Management CCSP

    13. 613 Risk Management Frameworks CCSP

    14. 614 Vendor Management CCSP

    15. 615 Statement on Standards for Attestation Engagements (SSAE-18) CCSP

    16. 616 Domain 6 Summary CCSP

    17. 617 Conclusion CCSP

About this course

  • $89.00
  • 150 lessons
  • 12.5 hours of video content

Discover your potential, starting today

Hurry! This Exclusive Deal Ends In

Don’t miss out on this opportunity to upskill with Learn Ezy!

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds

Get In Touch

Add your email to the mailing list to get the latest updates.

Thank You