Table of contents
Cloud Concepts, Architecture and Design for CCSP® - Course Overview
2m 1s
Lock icon
Course Overview | 2m 1s
Cloud Concepts and Architecture
1h 6m 50s
Lock icon
Cloud Concepts and Architecture | 6m 5s
Lock icon
Cloud Deployment Models | 8m 28s
Lock icon
Why Chose Cloud Computing? | 7m 3s
Lock icon
Building the Cloud | 7m 43s
Lock icon
Cloud Computing Roles | 10m 11s
Lock icon
Cloud Essential Characteristics | 10m 51s
Lock icon
Cloud Deployments | 6m 36s
Lock icon
Cloud Service Models | 5m 23s
Lock icon
Other Considerations for the Cloud | 4m 30s
Principles of Secure Cloud Computing
36m 53s
Lock icon
Principles of Secure Cloud Computing | 3m 34s
Lock icon
Areas of Cloud Security | 8m 47s
Lock icon
Securing Data in the Cloud | 12m 14s
Lock icon
Principles of Secure Cloud Computing | 7m 20s
Lock icon
Business Continuity? | 4m 58s
Evaluating Cloud Providers
18m 10s
Lock icon
Evaluating Cloud Providers | 4m 52s
Lock icon
Cloud Evaluations | 13m 18s
Cloud Concepts, Architecture and Design for CCSP® - Course Summary
5m 25s
Lock icon
Domain Summary | 5m 25s
Cloud Data Security for CCSP® - Course Overview
1m 24s
Lock icon
Course Overview | 1m 24s
Cloud Data Security Concepts
53m
Lock icon
Cloud Data Security Concepts | 11m 51s
Lock icon
The Cloud Data Lifecycle | 10m 16s
Lock icon
Cloud Data Classification | 9m 32s
Lock icon
Protecting Data | 7m 47s
Lock icon
Data Disposition | 13m 34s
Data Security Technologies
46m 11s
Lock icon
Data Security Technologies | 6m
Lock icon
Cloud Data Protection | 6m 45s
Lock icon
Encryption and Key Management | 11m 36s
Lock icon
Hashing | 6m 40s
Lock icon
Cloud Data Event Management | 15m 10s
Cloud Data Security for CCSP® - Course Summary
5m 3s
Lock icon
Course Summary | 5m 3s
Cloud Platform and Infrastructure Security for CCSP® - Certification Prep (Course Overview)
2m 17s
Lock icon
Cloud Platform Infrastructure Security Ccsp Cert Course Overview | 2m 17s
Primary Cloud Platform and Infrastructure Functions and Risks
32m 2s
Lock icon
Cloud Service Descriptions | 2m 11s
Lock icon
Virtualization | 2m 21s
Lock icon
Software Defined Network and Network Function Virtualization | 3m 29s
Lock icon
Compute Services | 3m 25s
Lock icon
Storage Services | 2m 25s
Lock icon
Management Plane | 3m 17s
Lock icon
Cloud Virtualization Risks and Remediation | 9m 14s
Lock icon
Zero – Trust Cloud Architecture | 4m 29s
Lock icon
Summary | 1m 11s
Secure Data Center Design and Supporting Controls
21m 2s
Lock icon
Data Center Design Standards | 6m 45s
Lock icon
Design Resilience – Protection Classes | 1m 42s
Lock icon
Design Resilience Fire Suppression | 3m 45s
Lock icon
Design Resilience Heating Ventilation and Air Conditioning | 4m 4s
Lock icon
Design Resilience – Availability Classes | 3m 34s
Lock icon
Summary | 1m 12s
Cloud-based BCDR
28m 8s
Lock icon
Understanding BCDR | 9m 11s
Lock icon
Creating a Business Established BCDR Strategy | 8m 42s
Lock icon
Creating, Implementing, and Testing BCDR | 8m 33s
Lock icon
Summary | 1m 42s
Cloud Application Security for CCSP® - Course Overview
1m 41s
Lock icon
Course Overview | 1m 41s
Cloud Application Development Security
49m 39s
Lock icon
Cloud Application Development Security | 7m 21s
Lock icon
Cloud-based Threats | 8m 45s
Lock icon
Building Secure Systems | 5m 55s
Lock icon
Systems Development Methodologies | 11m 9s
Lock icon
Identity Basics | 7m 58s
Lock icon
Identity Management | 8m 31s
Cloud Application Security Testing
38m 18s
Lock icon
Cloud Application Security Testing | 6m 54s
Lock icon
Testing Methodologies | 13m 55s
Lock icon
Verified Secure Software | 5m 25s
Lock icon
Secure Application Standards | 12m 4s
Cloud Application Security for CCSP® - Course Summary
3m 53s
Lock icon
Domain Summary | 3m 53s
Cloud Security Operations for CCSP® - Course Overview
1m 35s
Lock icon
Course Overview | 1m 35s
Operating and Maintaining Physical and Logical Cloud Security - Part 1 Components
25m 8s
Lock icon
Service Provider Hypervisor Security | 6m 27s
Lock icon
Trusted Platform Module | 3m 8s
Lock icon
Hardware Security Module (HSM) | 3m 39s
Lock icon
Security Group and Jumpbox Configuration | 2m 5s
Lock icon
Demo: Security Group Configuration | 3m 32s
Lock icon
Additional Network Security Controls | 2m 46s
Lock icon
Data Encryption Key (DEK) for Storage Services | 2m 33s
Lock icon
Summary | 58s
Operating and Maintaining Physical and Logical Cloud Security - Part 2 Services
30m 57s
Lock icon
VXLAN | 3m
Lock icon
DNS and Security Issues | 6m 35s
Lock icon
Internet Protocol Security (IPsec) VPN | 3m 15s
Lock icon
Transport Layer Security (TLS) VPN | 4m 21s
Lock icon
Demo: VM OS Vulnerability Monitoring and Hardening | 6m 54s
Lock icon
DHCP and Security Issues | 2m 46s
Lock icon
Demo: Maintain Cloud Infrastructure as Code (IaC) | 3m 7s
Lock icon
Summary | 59s
Implementing Administrative Operational Controls
34m 50s
Lock icon
Implementing Administrative Controls | 6m 57s
Lock icon
Implementing Change Management | 6m
Lock icon
Implementing Incident and Problem Management | 4m 9s
Lock icon
Availability, Capacity, and Service Level Management | 5m 20s
Lock icon
Manage Communications with Relevant Parties | 3m 23s
Lock icon
Implementing Release, Deployment, and Patch Management | 8m 9s
Lock icon
Summary | 52s
Manage Security Operations
26m 3s
Lock icon
Security Operations Center Standards | 6m 36s
Lock icon
Intelligent Monitoring of Security Controls | 2m 11s
Lock icon
Implementing Log Capture and Analysis | 7m 35s
Lock icon
Demo: Cloud Monitoring | 5m 34s
Lock icon
Support Digital Forensics | 3m 11s
Lock icon
Summary | 56s
Cloud Security Operations for CCSP® - Course Summary
4m 52s
Lock icon
Domain Summary | 4m 52s
Legal, Risk, and Compliance for CCSP® - Course Overview
1m 29s
Lock icon
Course Overview | 1m 29s
Cloud Privacy and Legal Issues
27m 32s
Lock icon
Common Legal Definitions | 7m 42s
Lock icon
Understand Jurisdictional Differences in Data Privacy | 6m 44s
Lock icon
Enumerate Country Specific Legislation | 4m 2s
Lock icon
Maintaining Legal and Regulated Privacy | 8m 8s
Lock icon
Summary | 56s
Organizational and Cloud Risk Management
25m 25s
Lock icon
Defining Risk and Related Terms | 2m 31s
Lock icon
A Story to View the Elements of Risk in Motion | 3m 52s
Lock icon
NIST and ISO Frameworks for Risk Management | 4m 10s
Lock icon
Establishing Qualitative and Quantitative Analysis | 7m 8s
Lock icon
Risk Treatment Response | 3m 20s
Lock icon
Applying the Risk Process | 3m 1s
Lock icon
Applying the Risk Process | 1m 23s
Cloud Audit and Assurance
25m 44s
Lock icon
Cloud Audit and Assurance | 3m 16s
Lock icon
Attestation for Technical and Financial Reporting Controls | 3m 43s
Lock icon
Certification for Information Security Management System (ISMS) | 6m 25s
Lock icon
Cloud Specific Attestations and Certifications | 5m 16s
Lock icon
Evaluating Cloud Service Providers by EuroCloud StarAudit | 2m 57s
Lock icon
Reviewing Audit Practice Acceptability | 2m 44s
Lock icon
Summary | 1m 23s
Legal, Risk, and Compliance for CCSP® - Course Summary
4m 59s
Lock icon
Course Summary | 4m 59s
Exam Review and Tips for CCSP® - Course Overview
3m 2s
Lock icon
Course Overview | 3m 2s
Exam Overview
2m 51s
Lock icon
Avoid Applying Variables to Exam Questions | 2m 51s
Exam Preparation Strategy
6m 9s
Lock icon
Preparation by Definition, Application, and Integration | 6m 9s
Exam Review and Tips for CCSP® - Course Summary
8m 32s
Lock icon
Analyzing Assessment Questions for the CCSP® Exam | 8m 32s
About the authors
Kevin Henry
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
More Courses by Kevin H.
Dr. Lyron H. Andrews
Dr. Andrews’ technology career spans three decades as a cyber security expert, author, researcher, and social justice entrepreneur.
More Courses by Dr. Lyron H. Andrews
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon