CCSP 2019: Secure Cloud Computing

CCSP    |    Intermediate
  • 17 videos | 1h 21m 1s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 74 users Rating 4.7 of 74 users (74)
Explore security solutions related to securing cloud-based IT systems and data including jump boxes and firewalls in this 13-video course. Discover how disaster recovery concepts such as RTO (recovery time objective) and RPO (recovery point objective) apply to the cloud. This course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Examine Internal Information Security Management and Security Control Systems, cryptography, and encryption of cloud-hosted assets. Learn about access control for cloud-hosted assets, asset removal, and storage media sanitization. Explore cloud network security issues and solutions such as firewall access control lists (ACLs). Learn how a jump box limits direct cloud virtual machine access. Capture traffic in a Microsoft Azure cloud computing environment, and deploy a Microsoft Azure Firewall. Look at security in virtualized environments, including infrastructure and data threats and platform-specific security responsibilities. Examine the security-based lifecycle of cloud-hosted assets and business continuity and disaster recovery concepts such as RTO and RPO and cloud functional security. Finally, learners view methodologies for mapping cloud service requirements to service provider certification and product certifications.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the deployment of internal information security management and security control systems
    Describe the encryption of cloud-hosted assets
    Describe access and access control for cloud-hosted assets like data, files, and resources
    Outline asset and media management with respect to deletion, removal, and overwrite on a cloud platform
    Define issues and solutions relating to cloud network structures
    Deploy a jump box to limit direct cloud virtual machine access
    Capture traffic in a microsoft azure cloud computing environment
    Deploy a microsoft azure firewall
  • Define issues and solutions relating to cloud virtualization infrastructures including hypervisor security and container security
    List and describe known and common threats to cloud infrastructure and data assets
    Define security responsibilities on a per cloud model
    Describe the security-based data life cycle of cloud-hosted assets like data, files, and features
    Describe business continuity and disaster recovery as it applies to a cloud service, rto, rpo, rlo, and rsl
    Describe focus areas relating to the functional security of the cloud service including vendor lock-in, interoperability, portability, migration, etc. as per (iso/iec) 27017
    Describe methodologies for mapping cloud service requirements to service provider certification and product certifications
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 27s
  • 4m 8s
    Upon completion of this video, you will be able to describe the deployment of Internal Information Security Management and Security Control Systems. FREE ACCESS
  • Locked
    3.  Cryptography and Cloud Computing
    5m 20s
    Upon completion of this video, you will be able to describe the encryption of assets hosted in the cloud. FREE ACCESS
  • Locked
    4.  Asset Access Control
    4m 54s
    Upon completion of this video, you will be able to describe access and access control for cloud-hosted assets such as data, files, and resources. FREE ACCESS
  • Locked
    5.  Asset Removal and Storage Media Sanitization
    3m 25s
    Find out how to outline asset and media management with respect to deletion, removal, and overwrite on a cloud platform. FREE ACCESS
  • Locked
    6.  Cloud Network Security
    5m 18s
    In this video, find out how to define issues and solutions relating to cloud network structures. FREE ACCESS
  • Locked
    7.  Jump Boxes
    5m 22s
    Find out how to deploy a jump box to limit direct access to cloud virtual machines. FREE ACCESS
  • Locked
    8.  Cloud Packet Capturing
    3m 2s
    Learn how to capture traffic in a Microsoft Azure cloud computing environment. FREE ACCESS
  • Locked
    9.  Cloud Firewalls
    7m 56s
    In this video, you will deploy a Microsoft Azure firewall. FREE ACCESS
  • Locked
    10.  Security in the Virtualized Environment
    6m 25s
    During this video, you will learn how to define issues and solutions relating to cloud virtualization infrastructures, including hypervisor security and container security. FREE ACCESS
  • Locked
    11.  Infrastructure and Data Threats
    4m 21s
    After completing this video, you will be able to list and describe known and common threats to cloud infrastructure and data assets. FREE ACCESS
  • Locked
    12.  Platform-specific Security
    5m 27s
    Find out how to define security responsibilities on a per-cloud model. FREE ACCESS
  • Locked
    13.  Cloud Secure Data Life Cycle
    4m 1s
    Upon completion of this video, you will be able to describe the security-based data life cycle of cloud-hosted assets such as data, files, and features. FREE ACCESS
  • Locked
    14.  Cloud Service Continuity
    8m 10s
    Upon completion of this video, you will be able to describe business continuity and disaster recovery as it applies to a cloud service, including RTO, RPO, RLO, and RSL. FREE ACCESS
  • Locked
    15.  Cloud Functional Security
    3m 14s
    Upon completion of this video, you will be able to describe focus areas relating to the functional security of the cloud service including vendor lock-in, interoperability, portability, migration, etc. as per (ISO/IEC) 27017. FREE ACCESS
  • Locked
    16.  Cloud Service Certification Assessment
    6m 22s
    After completing this video, you will be able to describe how to map cloud service requirements to service provider certification and product certifications. FREE ACCESS
  • Locked
    17.  Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 847 users Rating 4.6 of 847 users (847)
Rating 4.6 of 1773 users Rating 4.6 of 1773 users (1773)
Rating 4.7 of 64 users Rating 4.7 of 64 users (64)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 56 users Rating 4.3 of 56 users (56)
Rating 4.6 of 148 users Rating 4.6 of 148 users (148)
Rating 4.4 of 1225 users Rating 4.4 of 1225 users (1225)