×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Cloud Security Professional - CCSP
Introduction
Welcome (0:42)
Introduction (3:26)
Domain 1: Architectural Concepts and Design Requirements
Domain 1: Architectural Concepts and Design Requirements (1:40)
NIST SP 800 -145 (1:50)
Managed Service Provider (1:47)
Why Cloud Computing ? (5:02)
IaaS vs PaaS vs SaaS (2:20)
SaaS (4:20)
PaaS (1:59)
IaaS (1:54)
Cloud Deployment (0:44)
Public Cloud (8:00)
Private Cloud (2:58)
Hybrid Cloud (1:25)
Community Cloud (2:13)
Select the right solution (6:08)
Domain 2: Cloud Data Security
Introduction to Cloud Data Security (0:26)
Storage Architecture (1:20)
Data Life Cycle Security (4:22)
Information Rights Management (1:38)
IMR Demonstration (1:38)
Data Loss Preventions (DLP) (1:44)
DLP Demonstration (14:55)
Database Security (1:14)
Data Encryption (5:26)
Management Control (8:01)
Event Management (3:30)
Domain 3: Cloud Platform and Infrastructure Security
Introduction to Platform and Infrastructure security (0:52)
Hypervisor (4:44)
Virtualization Security (5:21)
Perimeter Security (6:00)
Domain 4: Cloud Application Security
Introduction to Cloud Application Security (2:10)
Software Development Life Cycle - SDLC (4:31)
OWASP Top 10 (3:48)
What is SQL Injection Attack (9:48)
SQL Injection attack (2:23)
Cross Site Scripting
Cross Site Script Attack (6:49)
Software Defense (6:13)
Cryptography on the Cloud (8:38)
Common Computer Architecture (4:51)
Access Management (10:46)
Cloud Threats (3:49)
BCP and DRP (3:47)
Business Continuity Plans (14:32)
Disaster Recovery Plans (3:29)
MTD-RTO-RPO (11:39)
VA and PT (11:15)
Domain 5: Operations
Introduction to Operations (0:37)
Physical Security (5:27)
HR Security (5:37)
Network Secuirty (4:20)
Introduction to Risk (9:17)
Risk (11:59)
Asset Evaluation (18:28)
Domain 6: Legal and Compliance
Domain 6: Introduction (1:00)
Incident Response (8:37)
Computer Forensic (4:18)
Type of Evidence (0:53)
Types of Law (6:49)
Liability (3:52)
Access Management
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock