Companies Home Search Profile

CCSP Cert Prep: 5 Cloud Security Operations

Focused View

Mike Chapple

2:46:30

144 View
  • 01 - Cloud security operations.mp4
    01:24
  • 02 - What you need to know.mp4
    00:36
  • 03 - Study resources.mp4
    01:47
  • 01 - Hardware security configuration.mp4
    03:46
  • 02 - Hardware security modules.mp4
    02:53
  • 03 - Virtualization security configuration.mp4
    03:02
  • 01 - Securing local and remote access.mp4
    04:49
  • 02 - Security zones.mp4
    03:52
  • 03 - Building lines of communication.mp4
    02:38
  • 01 - TCPIP networking.mp4
    05:06
  • 02 - IP addressing and DHCP.mp4
    03:55
  • 03 - DNS.mp4
    04:22
  • 04 - Network ports.mp4
    03:37
  • 05 - ICMP.mp4
    03:16
  • 06 - Public and private addressing.mp4
    05:51
  • 07 - Subnetting.mp4
    03:03
  • 08 - VLANs and network segmentation.mp4
    01:36
  • 01 - Firewalls.mp4
    06:35
  • 02 - Network security groups.mp4
    02:56
  • 03 - VPNs and VPN concentrators.mp4
    04:29
  • 04 - Network intrusion detection and prevention.mp4
    05:01
  • 05 - Zero trust networking.mp4
    04:09
  • 01 - Developing security baselines.mp4
    04:00
  • 02 - Leveraging industry standards.mp4
    03:43
  • 03 - Customizing security standards.mp4
    02:14
  • 04 - Host availability.mp4
    02:53
  • 01 - Performance and capacity monitoring.mp4
    03:09
  • 02 - Managing an SOC.mp4
    01:45
  • 03 - The ITIL model.mp4
    02:33
  • 01 - What is vulnerability management.mp4
    05:02
  • 02 - Analyzing scan reports.mp4
    04:30
  • 03 - Correlating scan results.mp4
    02:20
  • 04 - Penetration testing.mp4
    05:00
  • 05 - Deception technologies.mp4
    02:51
  • 01 - Building an incident response program.mp4
    04:13
  • 02 - Creating an incident response team.mp4
    02:15
  • 03 - Incident communications plan.mp4
    02:42
  • 04 - Incident identification.mp4
    04:26
  • 05 - Escalation and notification.mp4
    02:29
  • 06 - Mitigation.mp4
    02:22
  • 07 - Containment techniques.mp4
    03:00
  • 08 - Incident eradication and recovery.mp4
    05:28
  • 09 - Validation.mp4
    02:24
  • 10 - Post-incident activities.mp4
    03:50
  • 11 - Incident response exercises.mp4
    01:37
  • 01 - Conducting investigations.mp4
    03:50
  • 02 - Evidence types.mp4
    03:28
  • 03 - Digital forensics.mp4
    03:21
  • 04 - Chain of custody.mp4
    01:50
  • 01 - Continuing your CCSP certification journey.mp4
    00:32
  • Description


    The omnipresence of cloud computing in the business world has created a high demand for cybersecurity professionals with cloud expertise. Earning the Certified Cloud Security Professional (CCSP) certification demonstrates that you have the skills needed to help businesses secure information and systems that used to live on site. In this course, learn how security operations function in the world of cloud computing as you prepare for the Certified Cloud Security Professional (CCSP) exam. This course covers the fifth domain of that exam: Cloud Security Operations. Mike Chapple demonstrates how to build, operate, and manage the physical and logical infrastructure required to support cloud computing. Plus, learn about digital forensics and the incident response process.

    Note: This course is designed to cover the most recent version of the CCSP exam, released in August 2022.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 50
    • duration 2:46:30
    • Release Date 2023/01/04