Companies Home Search Profile

Prepare for the (ISC)2 CCSP exam! - All six domains!

Focused View

Gwen Bettwy

18:39:02

54 View
  • 1. Overview of the CCSP test.mp4
    08:30
  • 1.1 Domain 1 CCSP.pdf
  • 1.2 Guardians domain 1 for Udemy.pdf
  • 1.3 ISO IEC 17788 2014 3.pdf
  • 1.4 NIST SP 800-145.pdf
  • 1.5 NIST SP 800-146.pdf
  • 1.6 SecaaS Cat 8 Encryption Implementation Guidance.pdf
  • 1.7 security-guidance-v4-updated-9-16.pdf
  • 1. Introduction.mp4
    09:20
  • 2. Governance, Risk Management & Compliance.mp4
    16:58
  • 3. Service Models.mp4
    22:42
  • 4. The Cloud and Its Contracts.mp4
    05:40
  • 5.1 ENISA Cloud Computing Security Risk Assessment.pdf
  • 5. Building the cloud.mp4
    27:20
  • 6.1 TCI Whitepaper.pdf
  • 6.2 TCI-Reference-Architecture-v2.0.pdf
  • 6. Securing the cloud.mp4
    11:41
  • 7. Control Verification.mp4
    12:11
  • 8. Threats to the Cloud.mp4
    21:14
  • 9. Related technologies.mp4
    14:07
  • 1.1 Domain 2 CCSP.pdf
  • 1.2 Guardians Domain 2 for udemy.pdf
  • 1. Introduction to Cloud Data Security.mp4
    06:39
  • 2. Cloud Data Lifecycle.mp4
    13:29
  • 3. Data Protection Policy.mp4
    03:07
  • 4. Data Classification.mp4
    13:51
  • 5. Data Science.mp4
    07:37
  • 6. Data Governance.mp4
    02:38
  • 7. Structured Data - Database and Data Warehouse.mp4
    12:36
  • 8. Unstructured data - Big Data.mp4
    08:36
  • 9. Data Storage.mp4
    09:25
  • 10. Data Dispersion.mp4
    12:36
  • 11. Application Programming Interface.mp4
    05:27
  • 12. Intro to Encryption.mp4
    05:32
  • 13. Encryption Data in Use.mp4
    02:18
  • 14. Encrypt Data at rest.mp4
    01:53
  • 15. Encrypt Data in Transit SSH.mp4
    04:34
  • 16. Encrypt Data in Transit TLS.mp4
    02:30
  • 17. Encrypt Data in Transit IPSec.mp4
    03:28
  • 18. Symmetric Encryption.mp4
    01:58
  • 19. Intro to Asymmetric Encryption.mp4
    07:04
  • 20. Use of Public & Private Keys.mp4
    04:13
  • 21. Hashing.mp4
    05:09
  • 22. Key storage locations.mp4
    11:27
  • 23. Key Management.mp4
    11:02
  • 24. Public Key Infrastructure (PKI).mp4
    10:33
  • 25. Key Storage Hardware - TPM & HSM.mp4
    03:58
  • 26. FIPS 140-2 and -3.mp4
    05:32
  • 27. Masking.mp4
    05:11
  • 28. Tokenization.mp4
    03:31
  • 29. Obfuscation.mp4
    03:40
  • 30. Anonymization.mp4
    07:29
  • 31. Maturity Models.mp4
    08:57
  • 32. DRM & IRM.mp4
    05:03
  • 33. Emerging Technologies.mp4
    07:27
  • 1.1 Domain 3 CCSP.pdf
  • 1.2 Guardians domain 3 for Udemy.pdf
  • 1.3 SecaaS Cat 4 Email Security Implementation Guidance.pdf
  • 1. Intro to Platform and Infrastructure.mp4
    10:58
  • 2. Architecture.mp4
    07:14
  • 3. Compute, Storage and Network.mp4
    07:56
  • 4. Intro to Networking & Switches.mp4
    09:35
  • 5. Virtual and Virtualized LANs.mp4
    03:48
  • 6. IP & Routers.mp4
    08:21
  • 7. Software Defined Networking (SDN).mp4
    11:42
  • 8. Content Defined Networking (CDN).mp4
    04:20
  • 9. Virtual Private Networks.mp4
    02:54
  • 10. Domain Name System (DNS).mp4
    08:21
  • 11. OS Hardening.mp4
    05:48
  • 12. DRS and DO.mp4
    09:34
  • 13. NSG and SAN.mp4
    10:28
  • 14. Data Storage.mp4
    04:37
  • 15. RAID & Erasure Coding.mp4
    07:13
  • 16. Egregious 11 Number 1-5.mp4
    09:10
  • 17.1 The-Egregious-11-Cloud-Computing-Top-Threats-in-2019-April2020.pdf
  • 17.2 Top-Threats-to-Cloud-Computing-Egregious-Eleven-Deep-Dive-090920 (1).pdf
  • 17.3 TopThreatstoCloudComputingPandemicEleven060622.pdf
  • 17. Egregious 11 Number 6-11.mp4
    13:27
  • 18. Treacherous 12.mp4
    11:14
  • 19.1 SecaaS Cat 5 Security Assessments Implementation Guidance.pdf
  • 19. Risk Appetite.mp4
    05:10
  • 20. Risk Tolerance.mp4
    04:23
  • 21. Basic Risk terms.mp4
    04:23
  • 22. Quantitative Risk Assessment.mp4
    05:41
  • 23. Qualitative Risk Assessment.mp4
    06:17
  • 24. Risk Response.mp4
    08:48
  • 25.1 SecaaS Cat 1 IAM Implementation Guidance.pdf
  • 25. Basic IAAA intro.mp4
    08:38
  • 26. Authorization and RBAC.mp4
    08:45
  • 27. Attribute Based Access Control (ABAC).mp4
    03:25
  • 28. Single Sign-On (SSO).mp4
    04:30
  • 29.1 saml-101-white-paper.pdf
  • 29. SAML.mp4
    07:44
  • 30. OAuth and OpenID.mp4
    06:53
  • 31. CASB.mp4
    06:05
  • 32.1 SecaaS Cat 3 Web Security Implementation Guidance.pdf
  • 32. Firewalls.mp4
    10:51
  • 33. IDS and IPS.mp4
    11:39
  • 34. Micro Segmentation.mp4
    05:44
  • 35. Hyper Segmentation.mp4
    02:51
  • 36. Blast Radius.mp4
    03:03
  • 37. Database and File Activity Monitors.mp4
    06:23
  • 38.1 SecaaS Cat 2 DLP Implementation Guidance.pdf
  • 38. Data Leak Prevention (DLP).mp4
    05:21
  • 39. Hot & Cold Air Aisles.mp4
    01:50
  • 40.1 uptime institue tiers.zip
  • 40. Data Center Tiers.mp4
    03:59
  • 41.1 ENISA Cloud Computing Security Risk Assessment.pdf
  • 41. BCM Introduction.mp4
    10:44
  • 42. The beginning of BCPDRP planning.mp4
    02:12
  • 43. Business Impact Assessment part 1.mp4
    05:13
  • 44. Business Impact Assessment - MTD & RTO.mp4
    09:20
  • 45. Business Impact Assessment - RTO & RPO.mp4
    05:00
  • 46. Business Impact Assessment -SDO & RSL.mp4
    03:34
  • 47. Recovery Strategies.mp4
    03:25
  • 48. Testing of the Plan.mp4
    06:37
  • 49. Embed in the User Community.mp4
    02:21
  • 1.1 Domain 4 CCSP.pdf
  • 1.2 Guardians Domain 4 for Udemy.pdf
  • 1. Introduction and What is Clean Code.mp4
    07:45
  • 2. Software Development Life Cycle (SDLC).mp4
    05:41
  • 3. Supply Chain Management.mp4
    03:14
  • 4. Software Development Methodologies.mp4
    06:09
  • 5. DevOps Practices.mp4
    09:12
  • 6. Xtra -My thoughts numbers 4 the test.mp4
    02:21
  • 7. CICD and DevSecOps.mp4
    03:43
  • 8. Software Verification and Validation.mp4
    04:00
  • 9. Software Testing.mp4
    08:32
  • 10. SANS Top 10 of 25 Programming Errors.mp4
    08:50
  • 11. OWASP Top 4 Programming Errors to know.mp4
    10:45
  • 12. ISO 27034.mp4
    07:03
  • 13. Sandbox.mp4
    03:54
  • 14. Threat Modeling.mp4
    10:40
  • 15. Orchestration.mp4
    01:44
  • 1.1 Domain 5 CCSP.pdf
  • 1.2 Guardians domain 5 for udemy.pdf
  • 1. Introduction to Operations.mp4
    01:21
  • 2. Building Secure Data Center.mp4
    10:33
  • 3. Manage Cloud Environment DC.mp4
    05:37
  • 4. Patch Management.mp4
    03:22
  • 5. FirewallsNSG.mp4
    04:40
  • 6. IDSIPS.mp4
    04:16
  • 7. ITILISO 20000.mp4
    05:48
  • 8. ITIL ContinuityIncidentProblem management.mp4
    07:48
  • 9. Security Operations Center (SOC).mp4
    04:55
  • 10. Logging.mp4
    10:12
  • 11. Packet Capture.mp4
    09:26
  • 12. Data Center Tiers - Tier 1 & 2.mp4
    04:31
  • 13. Data Center Tiers - Tier 3 & 4.mp4
    03:20
  • 14. Honeypots.mp4
    04:19
  • 15. Vulnerability Assessments & Penetration Testing.mp4
    08:22
  • 16. Penetration Testing Process.mp4
    09:30
  • 17. Data and Media Sanitization.mp4
    08:34
  • 18. Business Continuity Management.mp4
    03:28
  • 19. BCM - Issues.mp4
    09:09
  • 20. Business Continuity Plans - Policy.mp4
    01:24
  • 21. Project Management & Initiation.mp4
    01:46
  • 22. Business Impact Assessment (BIA).mp4
    06:06
  • 23. BIA - MTD to Disaster Declaration.mp4
    08:37
  • 24. BIA - RTO & RPO.mp4
    04:29
  • 25. BIA - SDO & RSL.mp4
    03:49
  • 26. Disaster Recovery Strategies.mp4
    03:21
  • 27. Document the plan.mp4
    00:37
  • 28. Implement, Test, and Update.mp4
    07:46
  • 29. Embed In the user community.mp4
    02:17
  • 1.1 Domain 6 CCSP.pdf
  • 1.2 Guardians Domain 6 for Udemy.pdf
  • 1.3 laws and related standards.zip
  • 1. Introduction to the Legal domain.mp4
    11:20
  • 2. Privacy laws and regulations introduction.mp4
    06:30
  • 3. General Data Protection Regulation (GDPR).mp4
    14:19
  • 4. Additional Privacy Laws.mp4
    06:25
  • 5. Privacy Management Framework (PMF) and Maturity Model (PMM).mp4
    05:48
  • 6. FedRAMP and CLOUD Act.mp4
    07:36
  • 7. PCI.mp4
    04:56
  • 8. PCI Requirements 1-3.mp4
    04:33
  • 9. PCI Requirements 4-6.mp4
    04:25
  • 10. PCI Requirements 7-12.mp4
    06:09
  • 11. ITAR and EAR.mp4
    02:11
  • 12. Industrial Control Systems.mp4
    07:21
  • 13. Audits.mp4
    14:27
  • 14. Gap analysis and CSA STAR, CCM & CAIQ.mp4
    02:08
  • 15. CSA STAR and CCM.mp4
    09:04
  • 16. Risk Apetite.mp4
    05:10
  • 17. Risk Tolerance.mp4
    04:23
  • 18. Quantitative Risk Assessment.mp4
    05:41
  • 19. Basic Risk Terminology.mp4
    04:23
  • 20. Qualitative Risk Assessment.mp4
    06:17
  • 21. Risk Response.mp4
    08:48
  • 22. Forensics Intro.mp4
    07:27
  • 23. Basic Cloud Forensics.mp4
    06:34
  • 24. E-Discovery.mp4
    08:40
  • 25. Basic Forensic Rules.mp4
    05:49
  • Description


    Covering all six domains of the August 2022 exam update!

    What You'll Learn?


    • Understand the architecture of the cloud, from the customer and provider perspectives.
    • Understand security within the cloud. e.g., encryption, firewalls, network security groups, etc.
    • Understand Identity and Access Management within the cloud.
    • Be able to discuss the shared responsibility model for cloud structures.
    • Be able to describe the relationship between laws, international and country standards, contracts and the cloud.
    • Have a clear understanding of the o

    Who is this for?


  • Anyone wishing to pursue their CCSP credential.
  • More details


    Description

    In this course we walk through all of the critical concepts within the Certified Cloud Security Professional exam outline.  I will guide you through all of the concepts that you need to know and advise you on the level of knowledge that you need to get comfortable with.

    There are over 18 hours of video content. There are a variety of reference documents throughout the course. Do watch for them. They include my cloud guardians book, my slides, as well as other useful documents such as the CSA guidance 4.0.

    We will explore information security in the cloud. A lot of information security remains the same when you transition to the cloud, but a lot changes. Everything is in here from Governance, Risk management, and Compliance (GRC) to encryption and building data centers.

    Most of this exam you should think from a customer perspective looking toward the cloud provider. However, there are points, especially in domains three and five, that the perspective of the exam question can and will change to that of a cloud provider.

    A solid understanding of networking involved in data centers is explored including firewalls, network security groups, intrusion detection systems, intrusion prevention systems and more. Fundamentally this is a datacenter course. If networking is a new topic to watch and learn about networking.

    There is plenty of information in here about the cloud and how it works. What I do say though, is the more you know the easier this test gets.  20 years of teaching CISSP and a deep dive into OpenStack made this exam easy for this instructor. Be careful, this is not an easy test, but the more you know the easier it gets.

    Who this course is for:

    • Anyone wishing to pursue their CCSP credential.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Hi! I am Gwen Bettwy CISSP-ISSAP, ISSMP, CCSP, CGEIT, CISM, CISA, SSCP, CCSI I have been traveling and teaching around the world since 1994. I began teaching Information Security in 2003 for (ISC)2. I have averaged about 2 courses a month since 1994. I began my career at Sprint which has helped me prepare for CCSPs cloud provider view.Most of the courses I have taught since 2003 has been CISSP, although CISM, CISA, SSCP, and CGEIT have been sprinkled through there. I began teaching CCSP in 2017, since the exam was not launched until 2015.I have a proven track record in the classroom of guiding students through information security concepts through to certification!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 161
    • duration 18:39:02
    • Release Date 2023/04/11