Companies Home Search Profile

CCSP Online Training

Focused View

Bob Salmans

17:22:37

172 View
  • 1-Cloud Concepts and Architecture.mp4
    05:28
  • 2-Cloud Computing Characteristics.mp4
    08:10
  • 3-Cloud Deployment Models.mp4
    13:48
  • 4-Infrastructure as a Service (IaaS).mp4
    05:29
  • 5-Platform as a Service (PaaS).mp4
    03:22
  • 6-Software as a Service (SaaS).mp4
    07:12
  • 7-Shared Responsibility.mp4
    05:49
  • 8-Impact From Emerging Technologies.mp4
    12:43
  • 1-Cryptography and Key Management.mp4
    14:50
  • 2-Access Control with IAM.mp4
    09:51
  • 3-Data and Media Sanitization.mp4
    08:35
  • 4-Network and Virtualization Security.mp4
    15:42
  • 5-Common Threats in the Cloud.mp4
    13:12
  • 1-Cloud Secure Data Lifecycle.mp4
    07:27
  • 2-Data Governance.mp4
    10:43
  • 3-Cloud Based DR and BC.mp4
    15:45
  • 4-Cost Benefit Analysis.mp4
    09:07
  • 5-Functional Requirements.mp4
    05:31
  • 6-Security Considerations for Different Cloud Categories.mp4
    10:02
  • 1-Evaluating Cloud Service Providers.mp4
    04:19
  • 2-ISO IEC 27017 - (ISC) CCSP.mp4
    10:04
  • 3-PCI-DSS - (ISC) CCSP.mp4
    05:41
  • 4-ENISA - (ISC) CCSP.mp4
    09:43
  • 5-CSA STAR.mp4
    09:10
  • 6-Additional Standards.mp4
    12:17
  • 1-Cloud Data Lifecycle.mp4
    12:57
  • 2-Data Functions.mp4
    11:57
  • 3-Data Dispersion.mp4
    07:42
  • 4-Cloud Storage Types.mp4
    12:51
  • 5-Threats to Storage.mp4
    11:43
  • 1-The Encryption Process and the Cloud.mp4
    08:30
  • 2-IaaS Data Encryption Options.mp4
    08:41
  • 3-Key Management.mp4
    09:24
  • 4-Data Hashing.mp4
    05:48
  • 5-Data Obfuscation and Anonymization.mp4
    10:28
  • 6-Data Loss Prevention (DLP).mp4
    09:20
  • 1-Data Discovery.mp4
    05:32
  • 2-Data Discovery Techniques and Issues.mp4
    06:57
  • 3-Data Classification.mp4
    08:19
  • 4-Information Rights Management (IRM).mp4
    11:07
  • 5-Data Retention and Deletion.mp4
    05:05
  • 6-Data Archival.mp4
    04:57
  • 7-Logs and Auditability.mp4
    06:57
  • 8-Log Storage.mp4
    06:13
  • 9-Chain of Custody and Non-Repudiation.mp4
    06:20
  • 1-Intro.mp4
    01:14
  • 2-Physical Environment.mp4
    12:37
  • 3-Networking and Communications.mp4
    13:08
  • 4-Compute and Storage.mp4
    11:53
  • 5-Virtualization.mp4
    06:30
  • 6-Management Plane.mp4
    07:39
  • 1-Intro - (ISC) CCSP.mp4
    01:20
  • 2-Datacenter Security.mp4
    10:45
  • 3-Physical Design.mp4
    07:22
  • 4-Temperature and Humidity.mp4
    07:04
  • 5-The Importance of Airflow.mp4
    09:34
  • 6-Multi-Vendor Pathway Connectivity.mp4
    04:11
  • 1-Risk Assessments.mp4
    12:05
  • 2-Cloud Infrastructure Risk and Security.mp4
    12:04
  • 3-Cloud Specific Risks.mp4
    05:39
  • 4-Virtualization Risks.mp4
    07:06
  • 5-Countermeasure Strategies.mp4
    07:37
  • 6-Physical and Environmental Protection.mp4
    05:47
  • 7-System and Communication Protection.mp4
    10:17
  • 1-Protecting Virtualized Systems.mp4
    10:42
  • 2-Identification, Authentication and Authorization.mp4
    08:25
  • 3-Audit Mechanisms.mp4
    09:08
  • 4-Risks Related to the Cloud and BCDR.mp4
    11:42
  • 5-Business Requirements for BCDR.mp4
    09:17
  • 6-BCDR Strategy and Planning.mp4
    14:05
  • 7-BCDR Testing.mp4
    07:54
  • 1-Business Requirements.mp4
    06:59
  • 2-Phases of the SDLC.mp4
    07:35
  • 3-Development Methodologies.mp4
    05:48
  • 4-Cloud Specific Risks.mp4
    10:40
  • 5-Threat Modeling.mp4
    13:28
  • 6-Secure Coding Techniques.mp4
    06:19
  • 1-Intro.mp4
    01:34
  • 2-Common Cloud Application Vulnerabilities.mp4
    08:16
  • 3-Cloud Development Basics.mp4
    09:27
  • 4-Functional and Non-Functional Testing.mp4
    04:10
  • 5-Security Testing Methodologies.mp4
    09:39
  • 6-Quality Assurance.mp4
    07:35
  • 7-Abuse Case Testing.mp4
    04:56
  • 1-Supplemental Security Components.mp4
    16:12
  • 2-Cryptography and Applications.mp4
    10:54
  • 3-Application Virtualization and Orchestration.mp4
    11:33
  • 4-Federated Identity, MFA, OTP and SSO.mp4
    10:42
  • 5-CASB and Secrets Management.mp4
    08:06
  • 1-Hardware Specific Security Configurations.mp4
    09:03
  • 2-Security Configurations.mp4
    06:25
  • 3-Virtualization Toolset.mp4
    04:49
  • 4-Controlling Access.mp4
    07:46
  • 5-Securing the Network.mp4
    13:38
  • 6-Operating System Security.mp4
    05:16
  • 7-Stand Alone Hosts in the Cloud.mp4
    05:14
  • 1-Managing It All.mp4
    07:23
  • 2-Backups and Availability.mp4
    10:06
  • 3-Operational Controls and Standards.mp4
    08:26
  • 4-Supporting Digital Forensics.mp4
    15:20
  • 5-Managing Communications.mp4
    06:30
  • 6-Managing Security Operations.mp4
    09:33
  • 1-Intro to Legal, Risk and Privacy in the Cloud.mp4
    01:36
  • 2-Legal Requirements and Unique Risks in the Cloud.mp4
    04:46
  • 3-Legal Frameworks and Guidelines.mp4
    04:24
  • 4-E-Discovery and Forensic Requirements.mp4
    08:40
  • 5-Contractual vs Regulated Private Data.mp4
    03:30
  • 6-Country-Specific Legislation of Data Privacy.mp4
    11:02
  • 7-Privacy Standards and PIAs.mp4
    09:31
  • 8-Skill Review.mp4
    12:01
  • 1-Intro- Auditing in the Cloud.mp4
    00:37
  • 2-Audit Controls and Assurance.mp4
    07:49
  • 3-Audit Reports.mp4
    07:31
  • 4-Gap Analysis and Audit Planning.mp4
    06:39
  • 5-ISMS and ISCS.mp4
    05:05
  • 6-Policies.mp4
    04:14
  • 7-identification and Involvement of Relevant Stakeholders.mp4
    03:13
  • 8-Specialized Compliance Requirements.mp4
    04:47
  • 9-Impact of a Distributed IT Model.mp4
    05:16
  • 1-Assessing Risk Management and Data Roles.mp4
    08:11
  • 2-Regulatory Transparency and Risk Treatment.mp4
    08:28
  • 3-Risk Frameworks, Metrics and Environments.mp4
    07:31
  • 4-Business Requirements and Vendor Management.mp4
    10:47
  • 5-Contract Management.mp4
    07:00
  • 6-Supply Chain Management.mp4
    06:44
  • Description


    This intermediate (ISC)² CCSP training prepares learners to take the CCSP exam, which is the one required exam to earn the (ISC)² Certified Cloud Security Professional (CCSP) certification.

    Whether you want to enjoy a career as an enterprise-level architect or security administrator, systems engineer or security manager, the CCSP is sure to provide you with the career leverage you need. Use your in-depth knowledge of Cloud data security, cloud platform and infrastructure security, and cloud application security to transcend the humdrum of your desk job. Move into a career in motion with your CCSP.

    More details


    For anyone who leads an IT team, this CCSP training can be used for CCSP exam prep, on-boarding new security professionals, or as part of a team training plan.

    CCSP: What You Need to Know

    This (ISC)² Certified Cloud Security Professional (CCSP) training covers CCSP exam cloud security exam objectives, including these topics:

    • Architectural concepts and design requirements
    • Cloud data security
    • Cloud platform and infrastructure security
    • Cloud application security
    • Operations
    • Legal and compliance

    Who Should Take CCSP Training?

    This CCSP training is considered professional-level (ISC)² training, which means it was designed for security professionals. This cloud security skills course is valuable for new IT professionals with at least a year of experience with cloud security and experienced security professionals looking to validate their (ISC)² skills.

    New or aspiring security professionals. If you’re a new security professional, or you’re imagining a career in security, this CCSP training is one of the many opportunities you’ll haveto choose paths and directions for your future career. There’s no one-size-fits-all system for enterprise security needs, and the same is true of training: it’s only by diversifying your knowledge and certifications that you’ll be sure to have a long and stable career.

    Experienced security professionals. Even experienced security professionals have plenty to learn about the field. Whether it’s legal and compliance regulations, or how architectural concepts and design requirements affect your future decisions about operations, this training will show you just how many holes there are to patch, loops there are to close and regulations to learn as you continue on your security journey.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 125
    • duration 17:22:37
    • Release Date 2023/07/16

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Computer Network

    Subtitle
    Master Advanced Features of VMware vSphere 6 5
    SkillShareMaster Advanced Features of VMware vSphere 6 5
    12:31:21
    English subtitles
    10/03/2023

    Courses related to Cyber Security Awareness

    Courses related to Network Engineering

    Courses related to Network Monitoring

    Courses related to CCSP