Table of contents
Getting Started
3m 53s
Lock icon
About the Author | 1m 11s
Lock icon
About the Course | 1m 23s
Lock icon
Course Prerequisites | 1m 19s
Cloud Computing Concepts
9m 56s
Lock icon
Roles, Characteristics and Building Block Technologies | 9m 56s
Cloud Reference Architecture
2h 11m 31s
Lock icon
Cloud Computing Activities and Service Categories | 15m 59s
Lock icon
Cloud Deployment Models | 8m 51s
Lock icon
Cloud Shared Considerations | 7m 1s
Lock icon
Impact of Related Technologies | 8m 8s
Lock icon
Lab Preparation Video (Important) | 1m 32s
Lock icon
Access and Tour the AWS ConsoleAccess and Tour the AWS Console | 30m
Lock icon
Introduction to EC2Introduction to EC2 | 30m
Lock icon
Create a Windows EC2 Instance and Connect using Remote Desktop Protocol (RDP)Create a Windows EC2 Instance and Connect using Remote Desktop Protocol (RDP) | 30m
Cloud Security Concepts
1h 24m 25s
Lock icon
Cryptography and Key Management | 8m
Lock icon
Data and Media Sanitization | 3m 19s
Lock icon
Access Control | 6m 12s
Lock icon
Network Security and Virtualization Security | 8m 49s
Lock icon
Common Threats | 13m 5s
Lock icon
Introduction to AWS Identity and Access Management (IAM)Introduction to AWS Identity and Access Management (IAM) | 45m
Design Principles
30m 19s
Lock icon
Secure Cloud Data Lifecycle | 4m 34s
Lock icon
Cloud-Based Disaster Recovery (DR) and Business Continuity (BC) | 9m 33s
Lock icon
Cost-Benefit Analysis | 6m 24s
Lock icon
Functional Security Requirements | 4m 1s
Lock icon
Security Considerations for Different Cloud Categories | 5m 47s
Evaluate Cloud Service Providers
18m 22s
Lock icon
Verification Against Criteria | 13m 5s
Lock icon
System and Subsystem Product Certifications | 5m 17s
Describe Cloud Data Concepts
11m 26s
Lock icon
Cloud Data Lifecycle Phases | 6m 39s
Lock icon
Data Dispersion | 4m 47s
Design and Implement Cloud Data Storage Architecture
42m 18s
Lock icon
Storage Types | 4m 55s
Lock icon
Threats to Storage Types | 7m 23s
Lock icon
Creating Amazon S3 Buckets, Managing Objects, and Enabling Versioning Creating Amazon S3 Buckets, Managing Objects, and Enabling Versioning | 30m
Design and Apply Data Security Technologies and Strategies
34m 13s
Lock icon
Encryption and Key Management | 13m 33s
Lock icon
Hashing, Masking, and Obfuscation | 5m
Lock icon
Tokenization | 4m 16s
Lock icon
Data Loss Prevention (DLP) | 8m 2s
Lock icon
Data De-identification | 3m 22s
Implement Data Discovery and Classification
9m 10s
Lock icon
Structured and Unstructured Data | 5m 15s
Lock icon
Mapping, Labeling, and Sensitive Data | 3m 55s
Design and Implement Information Rights Management
8m 40s
Lock icon
IRM Objectives and Tools | 8m 40s
Plan and Implement Data Retention, Deletion, and Archival Policies
47m 23s
Lock icon
Data Retention Policies | 5m 7s
Lock icon
Data Deletion Procedures and Mechanisms | 3m 40s
Lock icon
Data Archival Procedures and Mechanisms | 6m 12s
Lock icon
Legal Hold | 2m 24s
Lock icon
Creating a Basic Amazon S3 Lifecycle PolicyCreating a Basic Amazon S3 Lifecycle Policy | 30m
Design and Implement Auditability, Traceability, and Accountability of Data Events
19m 14s
Lock icon
Definition of Event Sources and Requirements | 8m 15s
Lock icon
Logging, Storage, and Analysis of Data Events | 6m 42s
Lock icon
Chain of Custody and Non-Repudiation | 4m 17s
Cloud Infrastructure Components
30m 23s
Lock icon
Physical Environment | 7m 20s
Lock icon
Network and Communications | 5m 17s
Lock icon
Compute and Virtualization | 9m 47s
Lock icon
Storage and Management Plane | 7m 59s
Design a Secure Datacenter
33m 51s
Lock icon
Logical Design | 10m 11s
Lock icon
Physical Design | 9m 17s
Lock icon
Environmental Design | 14m 23s
Analyze Risks Associated with Cloud Infrastructure
19m 40s
Lock icon
Risk Assessment and Analysis | 8m 16s
Lock icon
Cloud Vulnerabilities, Risks, Threats, and Attacks | 6m 8s
Lock icon
Countermeasure Strategies | 5m 16s
Design and Plan Security Controls
20m 37s
Lock icon
Physical and Environmental Protection | 3m 46s
Lock icon
System and Communication Protection | 6m 53s
Lock icon
Identification, Authentication, and Authorization in Cloud Infrastructure | 4m 13s
Lock icon
Audit Mechanisms | 5m 45s
Plan Disaster Recovery (DR) and Business Continuity (BC)
45m 12s
Lock icon
Risks Related to the Cloud Environment | 7m 34s
Lock icon
Business Requirements | 6m 20s
Lock icon
Business Continuity/Disaster Recovery Strategy | 5m 31s
Lock icon
Creating a BCDR Plan | 14m 29s
Lock icon
Testing a BCDR Plan | 11m 18s
Advocate Training and Awareness for Application Security
7m 23s
Lock icon
Cloud Development Basics | 3m 30s
Lock icon
Common Pitfalls and Vulnerabilities | 3m 53s
Describe the Secure Software Development Life Cycle (SDLC) Process
11m 4s
Lock icon
Business Requirements and Phases/Methodologies | 11m 4s
Apply the Secure Software Development Life Cycle (SDLC)
16m 56s
Lock icon
Avoid Common Vulnerabilities During Development | 6m 25s
Lock icon
Cloud-Specific Risks and Quality Assurance | 5m 28s
Lock icon
Threat Modeling and Configuration Management | 5m 3s
Apply Cloud Software Assurance and Validation
7m 59s
Lock icon
Functional Testing and Security Testing Methodologies | 7m 59s
Use Verified Secure Software
4m 41s
Lock icon
Approved APIs and Third-Party Software | 4m 41s
Comprehend the Specifics of Cloud Application Architecture
1h 14m 9s
Lock icon
Supplemental Security Components | 3m 55s
Lock icon
Cryptography | 6m 59s
Lock icon
Sandboxing and Application Virtualization | 3m 15s
Lock icon
AWS Security Essentials - KMS Integration with S3AWS Security Essentials - KMS Integration with S3 | 1h 0m
Design Appropriate Identity and Access Management (IAM) Solutions
12m 11s
Lock icon
Federated Identity and Identity Providers | 3m 47s
Lock icon
Single Sign-On (SSO) and Multi-Factor Authentication (MFA) | 5m 7s
Lock icon
Cloud Access Security Broker (CASB) | 3m 17s
Implement and Build Physical and Logical Infrastructure for a Cloud Environment
8m 41s
Lock icon
Hardware-Specific Security Configuration Requirements | 3m 16s
Lock icon
Virtualization Management Toolsets | 5m 25s
Operate Physical and Logical Infrastructure for the Cloud Environment
32m 46s
Lock icon
Configure Access Control for Local and Remote Access | 6m 32s
Lock icon
Secure Network Configuration | 9m 39s
Lock icon
Operating System (OS) Hardening through the Application of Baselines | 3m 58s
Lock icon
Stand-Alone Hosts | 3m 51s
Lock icon
Availability of Clustered Hosts and Guest OSs | 8m 46s
Manage Physical and Logical Infrastructure for the Cloud Environment
32m 19s
Lock icon
Access Controls for Remote Access | 4m 13s
Lock icon
Patch Management | 11m 25s
Lock icon
Performance, Capacity, and Hardware Monitoring | 4m 24s
Lock icon
Backup and Restore Functions | 4m 39s
Lock icon
Network Security Controls and Management Plane | 7m 38s
Implement Operational Controls and Standards
19m 57s
Lock icon
Change and Continuity Management | 6m 50s
Lock icon
Information Security and Incident Management | 3m 21s
Lock icon
Problem and Deployment Management | 3m 31s
Lock icon
Additional Operational Management | 6m 15s
Support Digital Forensics
14m 40s
Lock icon
Forensic Data Collection Methodologies | 12m 12s
Lock icon
Evidence Management | 2m 28s
Manage Communication with Relevant Parties
6m 42s
Lock icon
Managing Communications | 6m 42s
Manage Security Operations
13m 3s
Lock icon
Security Operations Center (SOC) and Monitoring Security Controls | 3m 34s
Lock icon
Log Capture and Analysis | 3m 55s
Lock icon
Incident Management | 5m 34s
Articulate Legal Requirements and Unique Risks with the Cloud Environment
25m 42s
Lock icon
Conflicting International Legislation | 4m 36s
Lock icon
Legal Risks Specific to Cloud Computing | 1m 47s
Lock icon
Legal Frameworks and Guidelines | 13m 18s
Lock icon
eDiscovery | 3m 32s
Lock icon
Forensics Requirements | 2m 29s
Understand Privacy Issues
18m 36s
Lock icon
Contractual vs. Regulated Private Data | 5m 8s
Lock icon
Country-Specific Legislation Related to Private Data | 8m 29s
Lock icon
Jurisdictional Differences and Standard Privacy Requirements | 4m 59s
Understand Audit Processes, Methodologies, and Required Adaptations for a Cloud Environment
40m 40s
Lock icon
Audit Controls and Requirements | 5m 18s
Lock icon
Assurance Challenges of Virtualization and Cloud | 3m 56s
Lock icon
Types of Audit Reports | 5m 1s
Lock icon
Restrictions of Audit Scope Statements | 4m 47s
Lock icon
Gap Analysis and Audit Planning | 5m 16s
Lock icon
Internal Security Management System (ISMS) | 3m 58s
Lock icon
Policies and Involvement of Relevant Stakeholders | 7m 1s
Lock icon
Specialized Compliance Requirements for Highly Regulated Industries | 2m 16s
Lock icon
Impact of Distributed Information Technology (IT) Model | 3m 7s
Understand the Implications of Cloud-to-Enterprise Risk Management
24m 35s
Lock icon
Assess Providers' Risk Management Programs | 5m 36s
Lock icon
Data Owner/Controller vs. Data Custodian/Processor | 2m 38s
Lock icon
Regulatory Transparency Requirements | 2m 6s
Lock icon
Risk Treatment and Frameworks | 6m 56s
Lock icon
Metrics for Risk Management | 4m 13s
Lock icon
Assessment of Risk Environment | 3m 6s
Understand Outsourcing and Cloud Contract Design
16m 12s
Lock icon
Business Requirements | 3m 10s
Lock icon
Vendor Management | 5m 43s
Lock icon
Contract Management | 3m 48s
Lock icon
Supply Chain Management | 3m 31s
Next Steps
3h 4m 53s
Lock icon
How to Prepare for the Exam | 3m 2s
Lock icon
What's Next After Certification | 1m 51s
Lock icon
CCSPCCSP | 3h 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon