Cloud Computing Security Knowledge (CCSK)
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectual framework.
1.0 Cloud Security Overview Part 1
1.1 Cloud Security Overview Part 2
1.2 Cloud Diagrams
1.3 Cloud Services
2.0 Risk Management
2.1 Corporate Governance
2.2 Enterprise Risk Management
2.3 Risk Management Balance Process | Supply Chain Security
2.4 ERM Incidents | Recommendations Part 1
2.5 ERM Incidents | Recommendations Part 2
2.6 ERM Incidents | Recommendations Part 3
3.0 Cloud Legal Issues Part 1
3.1 Cloud Legal Issues Part 2 – Possession, Contract Consideration
3.2 Cloud Legal Issues Part 3 – Native Production
4.0 Audits
4.1 Compliance & Audit
4.2 Audit Recommendations
4.3 Audit Requirements
5.0 Information & Security
5.1 Storage
5.2 Information Governance | Classification
5.3 Data Security
5.4 Data Security Part 2 – Protecting Data Moving
5.5 Client Database Encryption
5.6 PaaS Encryption
6.0 Interoperability & Portability
6.1 Interoperability Recommendations
6.2 Portability Recommendations
6.3 Recommendations SaaS
7.0 Business Conitnuity & Disaster Recovery
7.1 Assessing CSP Security
7.2 Equipment Maintenance
7.3 Recommendations
8.0 Data Center Operations
9.0 Incident Response
9.1 Testing
9.2 IaaS
9.3 C.E.R. = Containment, Eradication, & Recovery
10.0 Application Security
10.1 Security Testing
10.2 Audit Compliance
10.3 Security Assurance Recommendations
11.0 Encryption & Key Management
11.1 Content Aware Encryption
11.2 Storage of Keys
12.0 Building Access Control
12.1 Intro to Identity
12.2 Entitlement Process
12.3 Trust with Identity
12.4 Recommendations for Identity Management
13.0 Virtualization
13.1 Hypervisor & Virtual Machine
13.2 Inter-Virtual Machine Attacks
13.3 Virtual Machine Encryption
13.4 Virtual Machine Recommendations & Requirements
14.0 Security as a Service (SaaS)
14.1 Implementing Advantages
14.2 Security Offerings
14.3 Intrusion Detection | Prevention
14.4 Business Continuity & Disaster Recovery
14.5 European CCSK
14.6 Top Security Benefits
14.7 European Legal Based Issues
Reviews
There are no reviews yet.