CCSP Cert Prep: 5 Cloud Security Operations

CCSP Cert Prep: 5 Cloud Security Operations

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 2h 26m | 426 MB

The omnipresence of cloud computing in the business world has created a high demand for cybersecurity professionals with cloud expertise. Earning the Certified Cloud Security Professional (CCSP) certification demonstrates that you have the skills needed to help businesses secure information and systems that used to live on site. In this course, learn how security operations function in the world of cloud computing as you prepare for the Certified Cloud Security Professional (CCSP) exam. This course covers the fifth domain of that exam: Cloud Security Operations. Mike Chapple demonstrates how to build, operate, and manage the physical and logical infrastructure required to support cloud computing. Plus, learn about digital forensics and the incident response process.

Topics include:

  • Hardware and visualization security configuration
  • Securing local and remote access
  • TCP/IP networking
  • Public and private addressing
  • Firewalls and network security groups
  • Developing security baselines
  • Performance and capacity monitoring
Table of Contents

Introduction
1 Cloud security operations
2 What you need to know
3 Study resources

Physical and Logical Infrastructure
4 Hardware security configuration
5 Virtualization security configuration

Secure Infrastructure Operations
6 Securing local and remote access
7 Security zones
8 Building lines of communication

Network Operations
9 TCPIP networking
10 IP addressing and DHCP
11 DNS
12 Network ports
13 ICMP
14 Public and private addressing
15 Subnetting
16 VLANs and network segmentation

Network Security
17 Firewalls
18 Network security groups
19 VPNs and VPN concentrators
20 Network intrusion detection and prevention

Security Baselines and Standards
21 Developing security baselines
22 Leveraging industry standards
23 Customizing security standards
24 Host availability

Monitoring
25 Performance and capacity monitoring
26 Managing a SOC
27 The ITIL model

Threat Assessment
28 Security assessment tools
29 Scan for threats and vulnerabilities
30 Assess threats
31 Threat assessment techniques
32 Penetration testing

Incident Management
33 Build an incident response program
34 Incident communications plan
35 Incident identification
36 Escalation and notification
37 Mitigation
38 Recovery and reconstitution
39 Lessons Learned and reporting

Investigations and Forensics
40 Conducting investigations
41 Evidence types
42 Digital forensics
43 Chain of custody

Conclusion
44 Continuing your CCSP certification journey