Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction to the CCSP
12m:54s

2.
Download your free study guide

3.
Exam Tips
15m:53s

4.
100% Pass Guarantee
3m:57s

5.
Checkpoint: Introduction

2 -
Cloud Computing Concepts
#
Lesson
Duration
Type
1.
Cloud Computing Concepts
3m:24s

2.
What is Cloud Computing
7m:47s

3.
Understanding Virtualization
8m:27s

4.
Cloud Infrastructure Components
11m:39s

5.
Cloud Roles And Responsibilities
7m:34s

6.
Cloud Computing Technologies - Part 1
8m:0s

7.
Cloud Computing Technologies - Part 2
9m:20s

8.
Cloud Computing Capabilities
8m:33s

9.
Checkpoint: Cloud Computing Concepts

3 -
Cloud Reference Architecture
#
Lesson
Duration
Type
1.
Cloud Reference Architecture
4m:8s

2.
Cloud Deployment Considerations
8m:22s

3.
Cloud Deployment Models
6m:19s

4.
Cloud Service Models
7m:20s

5.
Shared Security Responsibility
6m:55s

6.
Checkpoint: Cloud Reference Architecture

4 -
Cloud Security Concepts
#
Lesson
Duration
Type
1.
Cloud Security Concepts
3m:35s

2.
Common Cloud Vulnerabilities
7m:21s

3.
Virtualization Security - Part 1
7m:58s

4.
Virtualization Security - Part 2
8m:11s

5.
Security Threats In The Cloud - Part 1
6m:50s

6.
Security Threats In The Cloud - Part 2
6m:57s

7.
Security Threats In The Cloud - Part 3
9m:1s

8.
Security Hygiene Practices
6m:28s

9.
Checkpoint: Cloud Security Concepts

5 -
Secure Cloud Design
#
Lesson
Duration
Type
1.
Secure Cloud Design
5m:1s

2.
Secure Design Principles
10m:41s

3.
Functional Security Requirements
7m:1s

4.
Cloud Application Architecture
8m:53s

5.
Supplemental Security Components
7m:23s

6.
API Gateways
8m:43s

7.
Sandboxing
6m:31s

8.
Guest Operating System Toolsets
9m:16s

9.
High Availability
7m:0s

10.
Application Virtualization and Orchestration
7m:39s

11.
Checkpoint: Secure Cloud Design

6 -
Risk Assessments
#
Lesson
Duration
Type
1.
Risk Management
5m:10s

2.
Risk Frameworks
6m:41s

3.
Data Roles and Responsibilities
8m:36s

4.
Risk Treatment Strategies
6m:49s

5.
Making Risk Decisions
5m:19s

6.
Performance And Risk Indicators
4m:22s

7.
Supply Chain Management
5m:36s

8.
Conducting Risk Assessments
7m:11s

9.
Threat Modeling Concepts
5m:43s

10.
Threat Modeling Methodologies
8m:26s

11.
Checkpoint: Risk Assessments

7 -
Governance and Compliance
#
Lesson
Duration
Type
1.
Governance and Compliance
5m:33s

2.
Legal Requirements and Risks
5m:46s

3.
Legal Frameworks
5m:59s

4.
Understanding Privacy Requirements
5m:28s

5.
Privacy Impact Assessments
5m:49s

6.
Regulatory Transparency Requirements
5m:6s

7.
Business Contract Requirements
6m:12s

8.
Vendor Contract Requirements
5m:53s

9.
Contract Management
5m:57s

10.
Managing Stakeholder Communications
5m:52s

11.
Checkpoint: Governance and Compliance

8 -
Cloud Infrastructure Security
#
Lesson
Duration
Type
1.
Cloud Infrastructure Security
3m:56s

2.
Infrastructure Management Tools
5m:56s

3.
Infrastructure Security Requirements
8m:5s

4.
Security Of the Cloud
6m:26s

5.
System Security Controls
7m:24s

6.
Storage Security Controls
6m:33s

7.
Communication Security Controls
6m:21s

8.
Checkpoint: Cloud Infrastructure Security

9 -
Cloud Provider Security
#
Lesson
Duration
Type
1.
Cloud Provider Security
4m:5s

2.
Physical Data Center Design
4m:59s

3.
Environmental Data Center Design
7m:11s

4.
Data Center Resilience
5m:27s

5.
Cloud Provider Evaluations
6m:41s

6.
Common Criteria
5m:6s

7.
FIPS 140-2 / FIPS 140-3
5m:15s

8.
Checkpoint: Cloud Provider Security

10 -
Cloud Security Operations
#
Lesson
Duration
Type
1.
Cloud Security Operations
4m:40s

2.
Securing The Management Plane
6m:19s

3.
Operating System Hardening
6m:35s

4.
System Patch Management
7m:16s

5.
Infrastructure as Code
7m:13s

6.
DevOps and DevSecOps
6m:54s

7.
Host Availability Configuration
6m:2s

8.
Guest Host Resilience
5m:29s

9.
Vulnerability Assessments
6m:23s

10.
Checkpoint: Cloud Security Operations

11 -
Cloud Data Storage
#
Lesson
Duration
Type
1.
Cloud Data Storage
4m:55s

2.
Understanding Data States
6m:8s

3.
Structured and Unstructured Data
6m:57s

4.
Cloud Storage Types
7m:5s

5.
Storage and Cloud Service Models
6m:25s

6.
Threats To Cloud Storage
6m:33s

7.
Checkpoint: Cloud Data Storage

12 -
Cloud Data Security
#
Lesson
Duration
Type
1.
Cloud Data Security
4m:18s

2.
Cloud Secure Data Lifecycle
7m:19s

3.
Cloud Data Discovery
6m:55s

4.
Data Obfuscation Techniques
6m:39s

5.
Categorizing and Classifying Data
7m:25s

6.
Data Retention Policies
6m:8s

7.
Data Deletion Methods
6m:47s

8.
Information Rights Management
7m:11s

9.
Checkpoint: Cloud Data Security

13 -
Identity and Access Management
#
Lesson
Duration
Type
1.
Identity and Access Management
4m:17s

2.
Identity And Access Concepts
5m:45s

3.
Authentication Factors
4m:30s

4.
Federated Identity Management
6m:40s

5.
Federation Protocols
6m:28s

6.
Single Sign-On
5m:54s

7.
Cloud Access Security Broker
7m:58s

8.
Secrets Management
6m:46s

9.
Controlling Access To The Cloud
7m:14s

10.
Checkpoint: Identity and Access Management

14 -
Cloud Network Security
#
Lesson
Duration
Type
1.
Cloud Network Security
4m:9s

2.
Cloud Network Security Concepts - Part 1
5m:27s

3.
Cloud Network Security Concepts - Part 2
5m:38s

4.
Network Security Controls
7m:31s

5.
Secure Network Configurations
7m:49s

6.
Network Segmentation And Isolation
5m:58s

7.
Network Communications Security
7m:32s

8.
Zero Trust Networks
9m:4s

9.
Checkpoint: Cloud Network Security

15 -
Cryptography
#
Lesson
Duration
Type
1.
Cryptography
4m:14s

2.
Cryptography In The Cloud - Part 1
5m:50s

3.
Cryptography In The Cloud - Part 2
6m:30s

4.
Hash Functions
6m:23s

5.
Cryptographic Key Management
6m:12s

6.
Digital Signatures and Certificates
5m:13s

7.
Secrets and Certificate Management
6m:28s

8.
Checkpoint: Cryptography

16 -
Cloud BC/DR
#
Lesson
Duration
Type
1.
Cloud BC/DR
4m:28s

2.
Business Continuity In The Cloud
7m:41s

3.
Business Continuity Planning
7m:4s

4.
Business Impact Analysis
7m:0s

5.
Disaster Recovery Strategies
6m:19s

6.
Disaster Recovery Activities
6m:14s

7.
Disaster Recovery Testing
6m:17s

8.
Checkpoint: Cloud BC/DR

17 -
Incident Detection And Response
#
Lesson
Duration
Type
1.
Incident Detection And Response
5m:19s

2.
Log Capture And Analysis - Part 1
5m:21s

3.
Log Capture And Analysis - Part 2
6m:59s

4.
System Health And Status Monitoring
7m:8s

5.
Data Loss Prevention
7m:32s

6.
Incident Management
7m:47s

7.
Digital Forensic Incident Response
7m:52s

8.
Evidence Collection and Handling
7m:25s

9.
Checkpoint: Incident Detection And Response

18 -
Auditing Cloud Environments
#
Lesson
Duration
Type
1.
Auditing Cloud Environments
4m:6s

2.
Security Audit Planning
7m:35s

3.
Auditing Controls
6m:51s

4.
Security Audit Policies
7m:19s

5.
Security Gap Analysis
6m:32s

6.
Security Compliance Requirements
7m:49s

7.
Internal Security Management
6m:7s

8.
Software Testing
8m:2s

9.
Auditing Distributed Technologies
6m:47s

10.
Audit Reports
7m:23s

11.
Checkpoint: Auditing Cloud Environments

19 -
Software Security
#
Lesson
Duration
Type
1.
Software Security
3m:50s

2.
Secure Software Development Life Cycle
8m:9s

3.
Secure Coding Methodologies
6m:24s

4.
Secure Coding Best Practices
9m:21s

5.
Software API Security
7m:41s

6.
Software Acquisition
7m:3s

7.
Cloud Software Quality Assurance
7m:8s

8.
Application Security Awareness
7m:21s

9.
Software Configuration Management
6m:54s

10.
Checkpoint: Software Security

20 -
Cloud Service Management
#
Lesson
Duration
Type
1.
Cloud Service Management
4m:3s

2.
Operational Controls And Standards
6m:10s

3.
Managing Change Control
6m:23s

4.
Configuration Management
6m:11s

5.
Continuity Management
6m:35s

6.
Service Improvement Management
4m:35s

7.
Continuous Improvement
5m:17s

8.
Service Level Management
5m:40s

9.
Availability Management
5m:19s

10.
Capacity Management
5m:21s

11.
Checkpoint: Cloud Service Management

21 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
3m:40s

2.
BONUS: What comes next?
9m:19s

3.
Practice Exam
