Description
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectual framework.
Module 1: Architecture
1.0 Cloud Security Overview Part 1
1.1 Cloud Security Overview Part 2
1.2 Cloud Diagrams
1.3 Cloud Services
1.0 Cloud Security Overview Part 1
1.1 Cloud Security Overview Part 2
1.2 Cloud Diagrams
1.3 Cloud Services
Module 2: Governance and Enterprise Risk
2.0 Risk Management
2.1 Corporate Governance
2.2 Enterprise Risk Management
2.3 Risk Management Balance Process | Supply Chain Security
2.4 ERM Incidents | Recommendations Part 1
2.5 ERM Incidents | Recommendations Part 2
2.6 ERM Incidents | Recommendations Part 3
2.0 Risk Management
2.1 Corporate Governance
2.2 Enterprise Risk Management
2.3 Risk Management Balance Process | Supply Chain Security
2.4 ERM Incidents | Recommendations Part 1
2.5 ERM Incidents | Recommendations Part 2
2.6 ERM Incidents | Recommendations Part 3
Module 3: Legal Issues – Contracts and Electronic
3.0 Cloud Legal Issues Part 1
3.1 Cloud Legal Issues Part 2 – Possession, Contract Consideration
3.2 Cloud Legal Issues Part 3 – Native Production
3.0 Cloud Legal Issues Part 1
3.1 Cloud Legal Issues Part 2 – Possession, Contract Consideration
3.2 Cloud Legal Issues Part 3 – Native Production
Module 4: Compliance and Audit Management
4.0 Audits
4.1 Compliance & Audit
4.2 Audit Recommendations
4.3 Audit Requirements
4.0 Audits
4.1 Compliance & Audit
4.2 Audit Recommendations
4.3 Audit Requirements
Module 5: Information Management and Data Security
5.0 Information & Security
5.1 Storage
5.2 Information Governance | Classification
5.3 Data Security
5.4 Data Security Part 2 – Protecting Data Moving
5.5 Client Database Encryption
5.6 PaaS Encryption
5.0 Information & Security
5.1 Storage
5.2 Information Governance | Classification
5.3 Data Security
5.4 Data Security Part 2 – Protecting Data Moving
5.5 Client Database Encryption
5.6 PaaS Encryption
Module 6: Interoperability and Portability
6.0 Interoperability & Portability
6.1 Interoperability Recommendations
6.2 Portability Recommendations
6.3 Recommendations SaaS
6.0 Interoperability & Portability
6.1 Interoperability Recommendations
6.2 Portability Recommendations
6.3 Recommendations SaaS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
7.0 Business Conitnuity & Disaster Recovery
7.1 Assessing CSP Security
7.2 Equipment Maintenance
7.3 Recommendations
7.0 Business Conitnuity & Disaster Recovery
7.1 Assessing CSP Security
7.2 Equipment Maintenance
7.3 Recommendations
Module 8: Data Center Operations
8.0 Data Center Operations
8.0 Data Center Operations
Module 9: Incident Response
9.0 Incident Response
9.1 Testing
9.2 IaaS
9.3 C.E.R. = Containment, Eradication, & Recovery
9.0 Incident Response
9.1 Testing
9.2 IaaS
9.3 C.E.R. = Containment, Eradication, & Recovery
Module 10: Application Security
10.0 Application Security
10.1 Security Testing
10.2 Audit Compliance
10.3 Security Assurance Recommendations
10.0 Application Security
10.1 Security Testing
10.2 Audit Compliance
10.3 Security Assurance Recommendations
Module 11: Encryption and Key Management
11.0 Encryption & Key Management
11.1 Content Aware Encryption
11.2 Storage of Keys
11.0 Encryption & Key Management
11.1 Content Aware Encryption
11.2 Storage of Keys
Module 12: Identity, Entitlement, and Access Management
12.0 Building Access Control
12.1 Intro to Identity
12.2 Entitlement Process
12.3 Trust with Identity
12.4 Recommendations for Identity Management
12.0 Building Access Control
12.1 Intro to Identity
12.2 Entitlement Process
12.3 Trust with Identity
12.4 Recommendations for Identity Management
Module 13: Virtualization
13.0 Virtualization
13.1 Hypervisor & Virtual Machine
13.2 Inter-Virtual Machine Attacks
13.3 Virtual Machine Encryption
13.4 Virtual Machine Recommendations & Requirements
13.0 Virtualization
13.1 Hypervisor & Virtual Machine
13.2 Inter-Virtual Machine Attacks
13.3 Virtual Machine Encryption
13.4 Virtual Machine Recommendations & Requirements
Module 14: Security as a Service
14.0 Security as a Service (SaaS)
14.1 Implementing Advantages
14.2 Security Offerings
14.3 Intrusion Detection | Prevention
14.4 Business Continuity & Disaster Recovery
14.5 European CCSK
14.6 Top Security Benefits
14.7 European Legal Based Issues
14.0 Security as a Service (SaaS)
14.1 Implementing Advantages
14.2 Security Offerings
14.3 Intrusion Detection | Prevention
14.4 Business Continuity & Disaster Recovery
14.5 European CCSK
14.6 Top Security Benefits
14.7 European Legal Based Issues
Reviews
There are no reviews yet.