Ccsk - Certificate Of Cloud Security Knowledge V5 Training - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Ccsk - Certificate Of Cloud Security Knowledge V5 Training (/Thread-Ccsk-Certificate-Of-Cloud-Security-Knowledge-V5-Training--618385) |
Ccsk - Certificate Of Cloud Security Knowledge V5 Training - BaDshaH - 10-19-2024 Published 9/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 3.56 GB | Duration: 12h 13m The UNOFFICIAL Training to Prepare for CCSK v5.0 - Learn Cloud Security and CSA STAR, CMM, CAIQ What you'll learn Cloud computing concepts and architectures, including deployment and service models. Cloud governance principles and frameworks, including ISO 27017, CSA STAR, and PCI-DSS. Cloud risk management and compliance, including NIST RMF, ISO 31000, and privacy regulations. Identity and access management in cloud environments, covering RBAC, SSO, SASE, and CASB. Security monitoring, threat detection, and incident response strategies for the cloud. Infrastructure and networking in cloud environments, including virtualization, containers, and APIs. Cloud workload security, including Docker and Kubernetes security best practices. Cloud data security lifecycle, covering encryption, data loss prevention, and key management. Application security concepts, including OWASP Top 10, threat modeling, and DevOps security. Resilience and incident response, focusing on disaster recovery, business continuity, and SIEM. Emerging technologies such as AI, IoT, Blockchain, and their impact on cloud security. Requirements Willing to learn and Basic IT and Security Knowledge Will be Beneficial Description CCSK - Certificate of Cloud Security Knowledge v5 TrainingYour complete guide to mastering cloud security concepts, governance, and compliance for the CCSK certification.The CCSK - Certificate of Cloud Security Knowledge v5 Training provides an in-depth understanding of cloud security practices, preparing you to pass the CCSK certification exam. This course covers key domains including cloud governance, risk management, compliance, security architecture, and incident response. Whether you are new to cloud security or looking to validate your knowledge, this course offers a comprehensive curriculum that aligns with industry standards like NIST, ISO, and CSA.This training is ideal for individuals aiming to build a strong foundation in cloud security and pursue the CCSK certification to advance their career in the growing field of cloud computing.What You Will Learn:Cloud computing concepts and architectures, including deployment and service models.Cloud governance principles and frameworks, including ISO 27017, CSA STAR, and PCI-DSS.Cloud risk management and compliance, including NIST RMF, ISO 31000, and privacy regulations.Identity and access management in cloud environments, covering RBAC, SSO, SASE, and CASB.Security monitoring, threat detection, and incident response strategies for the cloud.Infrastructure and networking in cloud environments, including virtualization, containers, and APIs.Cloud workload security, including Docker and Kubernetes security best practices.Cloud data security lifecycle, covering encryption, data loss prevention, and key management.Application security concepts, including OWASP Top 10, threat modeling, and DevOps security.Resilience and incident response, focusing on disaster recovery, business continuity, and SIEM.Emerging technologies such as AI, IoT, Blockchain, and their impact on cloud security.Requirements:Basic knowledge of IT and networking concepts.No prior experience with cloud security is required-this course is suitable for beginners and experienced professionals alike.A computer with internet access to follow along with the lectures and practice activities.Course Curriculum Highlightsomain 1: Cloud Computing Concepts & ArchitecturesIntroduction to Cloud ComputingCloud Deployment and Service ModelsCSA Enterprise ArchitectureNIST Cloud Reference ArchitectureDomain 2: Cloud GovernanceCloud Governance FrameworksShared Responsibility MatrixISO 27017, PCI-DSS, and BSI C5Cloud Vendor Contracting and PoliciesDomain 3: Risk, Audit & ComplianceRisk Management and NIST RMFISO 27005, ISO 31000, and Privacy RegulationsCSA STAR, CCM, and CAIQDomain 4: Organization ManagementCloud Security Posture Management (CSPM)Cloud Workload Protection Platform (CWPP)Cloud Native Application Protection Platform (CNAPP)Domain 5: Identity & Access ManagementIdentity and Access Management (IAM)RBAC, SSO, and Authorization ModelsFederated Identity and Access Control ProtocolsDomain 6: Security MonitoringThreats and Vulnerabilities in CloudSecurity Vulnerabilities, CVE, and CVSSSecurity Operations Center and Log ManagementDomain 7: Infrastructure & NetworkingInfrastructure as Code and API SecurityVirtualization, Containers, and Serverless ComputingSoftware-Defined Networks and NFVDomain 8: Cloud Workload SecurityVirtualization and Container SecurityDocker and Kubernetes Security Best PracticesDefense in Depth and Cloud Security ControlsDomain 9: Data SecurityCloud Data Lifecycle and Data Protection PoliciesEncryption, Data Loss Prevention, and TokenizationInformation Rights Management (IRM) and Key ManagementDomain 10: Application SecurityOWASP Top 10 and Secure Coding PracticesDevOps and DevOps SecurityThreat Modeling and Software Security TestingDomain 11: Incident Response & ResilienceIncident Response Plan and Forensic Data CollectionBIA, DRP, BCP, RPO, and RTOBusiness Continuity Plan Testing and SIEMDomain 12: Related Technologies & StrategiesZero Trust ArchitectureNIST SP-800-53 OverviewAI, Blockchain, IoT, and Quantum ComputingWho Should Take This Course?IT professionals seeking to expand their cloud security knowledge.Cybersecurity specialists looking to secure cloud environments and systems.Cloud architects and engineers responsible for implementing secure cloud infrastructures.Business leaders aiming to understand cloud security governance and compliance.Students or newcomers interested in building a career in cloud security and pursuing the CCSK certification.Course FeaturesExpert Instructors: Learn from seasoned cloud security professionals with real-world experience.Comprehensive Curriculum: Covers all 12 CCSK domains with practical examples and scenarios.Certification Preparation: Tailored to help you pass the CCSK certification exam on your first attempt.Lifetime Access: Study at your own pace with lifetime access to all materials and future updates.Enroll NowJoin the CCSK - Certificate of Cloud Security Knowledge v5 Training now and secure your cloud environments with confidence! Overview Section 1: Introduction Lecture 1 CCSK Course Introduction Lecture 2 How to get the most out of this course? Lecture 3 About Trainer Section 2: Domain 1 Cloud Computing Concepts & Architectures Lecture 4 Introduction to Cloud Computing Lecture 5 Cloud Deployment Models Lecture 6 Cloud Service Models Lecture 7 CSA Enterprise Architecture Lecture 8 NIST Cloud Reference Archiecture Section 3: Domain 2 Cloud Governance Lecture 9 Cloud Shared Responsibility Matrix Lecture 10 Policies Lecture 11 Cloud Policies and Data Residency Lecture 12 Contracting with Cloud Vendors Lecture 13 Understand ISO 27017 and Key Provisions Lecture 14 BSI C5 & PCI SSC Lecture 15 NIST CSF Lecture 16 NIST SP 800-53 Lecture 17 CSA STAR, CCM, CAIQ Lecture 18 Cloud Governance Lecture 19 CCOE & Cloud Advisory Council Lecture 20 Cloud Deployment Registery Section 4: Domain 3 Risk, Audit, & Compliance Lecture 21 What is Risk Management? Lecture 22 NIST Risk Management Framework Lecture 23 NIST SP 800-30 Lecture 24 ISO 27005 & ISO 31000 Lecture 25 Privacy Regulations Lecture 26 The EU-U.S. Data Privacy Framework Lecture 27 Privacy Controls and E-Discovery Section 5: Domain 4 Organization Management Lecture 28 Cloud Organization Hierarchy models Lecture 29 CSP Policies Lecture 30 Cloud Security Posture Management - CSPM Lecture 31 Cloud Workload Protection Platform - CWPP Lecture 32 Cloud Native Application Protection Platform - CNAPP Lecture 33 Hybrid and Multi-Cloud Strategies Section 6: Domain 5 Identity & Access Management Lecture 34 Identity Access Management Lecture 35 Authorization Models and RBAC Lecture 36 Single sign-on (SSO) & RSO & MTLS Lecture 37 Key Access Control Concepts Lecture 38 Federated identity and IdP, OpenID, SAML, Auth Protocols Lecture 39 SASE & CASB Section 7: Domain 6 Security Monitoring Lecture 40 Threats and Vulnerabilities on Cloud Lecture 41 Security Vulnerabilities Lecture 42 Vulnerability Related Terms, CVE, CVSS Lecture 43 Advanced Persistent Threats Lecture 44 DOS & DDOS Attacks Lecture 45 Performance Monitoring and KPI Lecture 46 Security Operation Center Lecture 47 Log Management Lecture 48 Threat Intelligence Lecture 49 Digital Risk Protection and Dark Web Monitoring Section 8: Domain 7 Infrastructure & Networking Lecture 50 Understand Cloud Architecture, Region, AD Lecture 51 Understand the Multi-tenancy Lecture 52 Infrastructure as Code Lecture 53 API and API Gateway Lecture 54 Virtualization Lecture 55 Containers Lecture 56 Serverless Computing Lecture 57 Software Defined Network Lecture 58 Network Function Virtualization Section 9: Domain 8 Cloud Workload Security Lecture 59 Cloud Native Archiecture Lecture 60 Virtualization Security Lecture 61 Container Security Lecture 62 Docker Security Lecture 63 Kubernetes Security Lecture 64 Understand Security Controls Lecture 65 Best Practices in Control Selection Lecture 66 Defence in Depth Concept Section 10: Domain 9 Data Security Lecture 67 Cloud Data lifecycle Lecture 68 Data Storage and Retention and Archiving Lecture 69 Data dispersion in the Cloud and Data Flow Lecture 70 Data Disposal Lecture 71 Data Protection Policies, Encryption and Classification Lecture 72 Data obfuscation & Tokenization Lecture 73 Data loss prevention Lecture 74 Information Rights Management (IRM) Lecture 75 Secrets and Key Management Section 11: Domain 10 Application Security Lecture 76 OWASP Top 10 Lecture 77 CWE - Common Weak Enumeration Lecture 78 Threat Modeling Lecture 79 Secure Coding Lecture 80 Software Security Testing Lecture 81 DevOps Lecture 82 DevOps security Lecture 83 Penetration Testing Lecture 84 Bug Bounty Program Section 12: Domain 11 Incident Response & Resilience Lecture 85 Incident management Lecture 86 Incident Response Plan Lecture 87 Forensic data collection methodologies Lecture 88 SIEM Lecture 89 BIA, DRP, BCP Lecture 90 RPO & RTO Lecture 91 BCP Testing Section 13: Domain 12 Related Technologies & Strategies Lecture 92 Zero Trust vs Trust but Verify Lecture 93 Artificial Intelligence and Machine Learning Lecture 94 Generative AI Overview Lecture 95 Types of AI, Narrow, General Lecture 96 Block Chain and raise of Quantum Computing Lecture 97 IoT and ICS IT professionals seeking to expand their cloud security knowledge.,Cybersecurity specialists looking to secure cloud environments and systems.,Cloud architects and engineers responsible for implementing secure cloud infrastructures.,Business leaders aiming to understand cloud security governance and compliance.,Students or newcomers interested in building a career in cloud security and pursuing the CCSK certification. Homepage |