Description
The Express Training Pack or EPT, is a product designed to gain maximum knowledge in an efficient period of time. Each program contains lecture videos that emulate the content discussed in a live classroom environment. As you progress through each module, you will be challenged to a series of practice questions. In order to move on you must complete each rigorous quiz. Upon completion of all modules, you will gain access to a final practice exam, prepared by the instructor, to test your overall knowledge and mastery of the course.When you are steadily scoring 90 or above, you have achieved mastery and are ready to pass your exam.
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework.
This course is led by Dean Bushmiller
This Course Will Help You:
- Validate your competence gained through experience in cloud security
- Demonstrate your technical knowledge, skills, and abilities to effectively develop a holistic cloud security program relative to globally accepted standards
- Differentiate yourself from other candidates for desirable employment in the fast-growing cloud security market
- Gain access to valuable career resources, such as tools, networking and ideas exchange with peers
This Course Contains:
- A 10 hour lecture series that emulates a live classroom session.
- 100 Practice Questions designed to ready you for the live certification exam.
- Student Forums, where you can share ideas and feedback with our learning community.
- Instructor Support.
- Our ITU Pass Guarantee
Outline
Module 1: Architecture
1.0 Cloud Security Overview Part 1
1.1 Cloud Security Overview Part 2
1.2 Cloud Diagrams
1.3 Cloud Services
Module 2: Governance and Enterprise Risk
2.0 Risk Management
2.1 Corporate Governance
2.2 Enterprise Risk Management
2.3 Risk Management Balance Process | Supply Chain Security
2.4 ERM Incidents | Recommendations Part 1
2.5 ERM Incidents | Recommendations Part 2
2.6 ERM Incidents | Recommendations Part 3
Module 3: Legal Issues – Contracts and Electronic
3.0 Cloud Legal Issues Part 1
3.1 Cloud Legal Issues Part 2 – Possession, Contract Consideration
3.2 Cloud Legal Issues Part 3 – Native Production
Module 4: Compliance and Audit Management
4.0 Audits
4.1 Compliance & Audit
4.2 Audit Recommendations
4.3 Audit Requirements
Module 5: Information Management and Data Security
5.0 Information & Security
5.1 Storage
5.2 Information Governance | Classification
5.3 Data Security
5.4 Data Security Part 2 – Protecting Data Moving
5.5 Client Database Encryption
5.6 PaaS Encryption
Module 6: Interoperability and Portability
6.0 Interoperability & Portability
6.1 Interoperability Recommendations
6.2 Portability Recommendations
6.3 Recommendations SaaS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
7.0 Business Conitnuity & Disaster Recovery
7.1 Assessing CSP Security
7.2 Equipment Maintenance
7.3 Recommendations
Module 8: Data Center Operations
8.0 Data Center Operations
Module 9: Incident Response
9.0 Incident Response
9.1 Testing
9.2 IaaS
9.3 C.E.R. = Containment, Eradication, & Recovery
Module 10: Application Security
10.0 Application Security
10.1 Security Testing
10.2 Audit Compliance
10.3 Security Assurance Recommendations
Module 11: Encryption and Key Management
11.0 Encryption & Key Management
11.1 Content Aware Encryption
11.2 Storage of Keys
Module 12: Identity, Entitlement, and Access Management
12.0 Building Access Control
12.1 Intro to Identity
12.2 Entitlement Process
12.3 Trust with Identity
12.4 Recommendations for Identity Management
Module 13: Virtualization
13.0 Virtualization
13.1 Hypervisor & Virtual Machine
13.2 Inter-Virtual Machine Attacks
13.3 Virtual Machine Encryption
13.4 Virtual Machine Recommendations & Requirements
Module 14: Security as a Service
14.0 Security as a Service (SaaS)
14.1 Implementing Advantages
14.2 Security Offerings
14.3 Intrusion Detection | Prevention
14.4 Business Continuity & Disaster Recovery
14.5 European CCSK
14.6 Top Security Benefits
14.7 European Legal Based Issues