Certified Cloud Security Professional (CCSP)
(CCSP.AE1)
/ ISBN: 978-1-64459-187-1
This course includes
Lessons
TestPrep
LiveLab
Certified Cloud Security Professional (CCSP)
Create new career opportunities by being CCSP certified with the (ISC)² Certified Cloud Security Professional course and lab. CCSP study guide covers the CCSP exam objectives and offers hands-on learning experience in topics such as Data Classification, Cloud Data Security, Cloud Application Security, Operations Management, and many more.
(ISC)² CCSP certification validates a candidate's advanced technical skills and knowledge required to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the cybersecurity experts at (ISC)². (ISC)² Certified Cloud Security (CCSP) certified professionals will have the required knowledge and skills to manage cloud security.
Lessons
-
12+ Lessons
-
165+ Quizzes
-
85+ Flashcards
-
108+ Glossary of terms
TestPrep
-
125+ Pre Assessment Questions
-
3+ Full Length Tests
-
125+ Post Assessment Questions
-
375+ Practice Test Questions
LiveLab
-
37+ LiveLab
- Overview of the CCSP Exam
- Notes on This Course's Organization
- Cloud Characteristics
- Business Requirements
- Cloud Evolution, Vernacular, and Models
- Cloud Computing Roles and Responsibilities
- Cloud Computing Definitions
- Foundational Concepts of Cloud Computing
- Related and Emerging Technologies
- Summary
- Exam Essentials
- Written Labs
- Business Requirements Analysis
- Security Considerations for Different Cloud Categories
- Design Principles for Protecting Sensitive Data
- Summary
- Exam Essentials
- Written Labs
- Data Inventory and Discovery
- Jurisdictional Requirements
- Information Rights Management (IRM)
- Data Control
- Summary
- Exam Essentials
- Written Labs
- Cloud Data Lifecycle
- Cloud Storage Architectures
- Cloud Data Security Foundational Strategies
- Summary
- Exam Essentials
- Written Labs
- Shared Cloud Platform Risks and Responsibilities
- Cloud Computing Risks by Deployment Model
- Cloud Computing Risks by Service Model
- Virtualization
- Disaster Recovery (DR) and Business Continuity (BC)
- Summary
- Exam Essentials
- Written Labs
- Foundations of Managed Services
- Business Requirements
- Shared Responsibilities by Service Type
- Shared Administration of OS, Middleware, or Applications
- Shared Responsibilities: Data Access
- Lack of Physical Access
- Summary
- Exam Essentials
- Written Labs
- Training and Awareness
- Cloud-Secure Software Development Lifecycle (SDLC)
- ISO/IEC 27034-1 Standards for Secure Application Development
- Identity and Access Management (IAM)
- Cloud Application Architecture
- Cloud Application Assurance and Validation
- Summary
- Exam Essentials
- Written Labs
- Physical/Logical Operations
- Security Operations Center
- Summary
- Exam Essentials
- Written Labs
- Monitoring, Capacity, and Maintenance
- Change and Configuration Management (CM)
- IT Service Management and Continual Service Improvement
- Business Continuity and Disaster Recovery (BC/DR)
- Summary
- Exam Essentials
- Written Labs
- Legal Requirements and Unique Risks in the Cloud Environment
- Potential Personal and Data Privacy Issues in the Cloud Environment
- Audit Processes, Methodologies, and Cloud Adaptations
- Summary
- Exam Essentials
- Written Labs
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Business Requirements
- Cloud Contract Design and Management for Outsourcing
- Identifying Appropriate Supply Chain and Vendor Management Processes
- Summary
- Exam Essentials
- Written Labs
Hands on Activities (Live Labs)
- Capturing Network Traffic
- Creating a Virtual Machine
- Using an Asymmetric Algorithm
- Installing Ubuntu Using Server Manager
- Using a Symmetric Algorithm
- Using Windows Defender
- Creating a Demilitarized Zone
- Configuring a VPN
- Displaying Metadata Information
- Creating a Standard ACL
- Enabling an Access Control List
- Building IPSec VPN
- Configuring RAID 5
- Generating a Symmetric Key
- Generating an Asymmetric Key
- Observing an MD5-Generated Hash Value
- Observing an SHA-Generated Hash Value
- Performing a DoS Attack with SYN Flood
- Performing a MITM Attack
- Using Social Engineering Techniques to Plan an Attack
- Installing Web Application Proxy
- Performing a Credential-Based Brute-Force Attack
- Taking a Full Backup
- Taking an Incremental Backup
- Setting Up a Honeypot on Kali Linux
- Configuring a Firewall for Inbound Rules
- Removing Unnecessary Services
- Using the Event Viewer
- Authorizing a User
- Examining File Permissions
- Conducting Cross-Site Request Forgery with Low Complexity
- Attacking a Website Using Cross-Site Scripting (XSS) Injection
- Conducting IP Spoofing
- Verifying RAM Usage
- Checking Disk Capacity
- Using MBSA
- Completing the Chain of Custody
What are the prerequisites for this exam? | To qualify for this cybersecurity certification, you must pass the exam and have at least five years of cumulative, paid work experience in information technology, of which three years must be in information security, and one year in one or more of the six domains of the (ISC)² CCSP Common Body of Knowledge (CBK). |
---|---|
What is the exam registration fee? | USD 599 |
Where do I take the exam? | Pearson VUE |
What is the format of the exam? | Multiple choice |
How many questions are asked in the exam? | The exam contains 125 questions. |
What is the duration of the exam? | 180 minutes |
What is the passing score? | 700 |
What is the exam's retake policy? | In the event that you fail your first attempt at passing the CCSP certification, ISC2's retake policy is:
|
What is the validity of the certification? | Three years |
Where can I find more information about this exam? | Know more about the CCSP |
What are the career opportunities after passing this exam? |
|
×