390 - Certified Cloud Security Professional (CCSP)
- 收录时间:2020-01-13 19:24:15
- 文件大小:7GB
- 下载次数:48
- 最近下载:2020-11-24 02:08:47
- 磁力链接:
-
文件列表
- 005 - Cloud Computing Activities and Service Categories.mp4 167MB
- 058 - Creating a BCDR Plan.mp4 148MB
- 047 - Environmental Design.mp4 147MB
- 026 - Encryption and Key Management.mp4 139MB
- 098 - Legal Frameworks and Guidelines.mp4 138MB
- 014 - Common Threats.mp4 138MB
- 020 - Verification Against Criteria.mp4 134MB
- 090 - Forensic Data Collection Methodologies.mp4 127MB
- 082 - Patch Management.mp4 117MB
- 059 - Testing a BCDR Plan.mp4 116MB
- 062 - Business Requirements and Phases_Methodologies.mp4 112MB
- 045 - Logical Design.mp4 104MB
- 004 - Roles, Characteristics and Building Block Technologies.mp4 104MB
- 077 - Secure Network Configuration.mp4 100MB
- 043 - Compute and Virtualization.mp4 98MB
- 016 - Cloud-Based Disaster Recovery (DR) and Business Continuity (BC).mp4 98MB
- 046 - Physical Design.mp4 94MB
- 080 - Availability of Clustered Hosts and Guest OSs.mp4 91MB
- 013 - Network Security and Virtualization Security.mp4 90MB
- 006 - Cloud Deployment Models.mp4 90MB
- 033 - IRM Objectives and Tools.mp4 89MB
- 048 - Risk Assessment and Analysis.mp4 88MB
- 102 - Country-Specific Legislation Related to Private Data.mp4 87MB
- 008 - Impact of Related Technologies.mp4 86MB
- 038 - Definition of Event Sources and Requirements.mp4 85MB
- 029 - Data Loss Prevention (DLP).mp4 83MB
- 010 - Cryptography and Key Management.mp4 83MB
- 066 - Functional Testing and Security Testing Methodologies.mp4 82MB
- 044 - Storage and Management Plane.mp4 81MB
- 085 - Network Security Controls and Management Plane.mp4 78MB
- 055 - Risks Related to the Cloud Environment.mp4 77MB
- 041 - Physical Environment.mp4 76MB
- 025 - Threats to Storage Types.mp4 75MB
- 007 - Cloud Shared Considerations.mp4 74MB
- 069 - Cryptography.mp4 73MB
- 056 - Business Requirements.mp4 73MB
- 116 - Risk Treatment and Frameworks.mp4 72MB
- 086 - Change and Continuity Management.mp4 71MB
- 110 - Policies and Involvement of Relevant Stakeholders.mp4 70MB
- 039 - Logging, Storage, and Analysis of Data Events.mp4 70MB
- 052 - System and Communication Protection.mp4 70MB
- 076 - Configure Access Control for Local and Remote Access.mp4 69MB
- 092 - Managing Communications.mp4 68MB
- 022 - Cloud Data Lifecycle Phases.mp4 68MB
- 063 - Avoid Common Vulnerabilities During Development.mp4 67MB
- 017 - Cost-Benefit Analysis.mp4 67MB
- 054 - Audit Mechanisms.mp4 66MB
- 012 - Access Control.mp4 65MB
- 036 - Data Archival Procedures and Mechanisms.mp4 65MB
- 089 - Additional Operational Management.mp4 65MB
- 049 - Cloud Vulnerabilities, Risks, Threats, and Attacks.mp4 63MB
- 120 - Vendor Management.mp4 61MB
- 019 - Security Considerations for Different Cloud Categories.mp4 60MB
- 095 - Incident Management.mp4 59MB
- 113 - Assess Providers' Risk Management Programs.mp4 58MB
- 057 - Business Continuity_Disaster Recovery Strategy.mp4 57MB
- 075 - Virtualization Management Toolsets.mp4 56MB
- 108 - Gap Analysis and Audit Planning.mp4 55MB
- 104 - Audit Controls and Requirements.mp4 55MB
- 021 - System and Subsystem Product Certifications.mp4 55MB
- 042 - Network and Communications.mp4 54MB
- 101 - Contractual vs. Regulated Private Data.mp4 54MB
- 050 - Countermeasure Strategies.mp4 54MB
- 034 - Data Retention Policies.mp4 54MB
- 072 - Single Sign-On (SSO) and Multi-Factor Authentication (MFA).mp4 54MB
- 031 - Structured and Unstructured Data.mp4 54MB
- 064 - Cloud-Specific Risks and Quality Assurance.mp4 53MB
- 106 - Types of Audit Reports.mp4 52MB
- 024 - Storage Types.mp4 52MB
- 065 - Threat Modeling and Configuration Management.mp4 51MB
- 107 - Restrictions of Audit Scope Statements.mp4 50MB
- 103 - Jurisdictional Differences and Standard Privacy Requirements.mp4 50MB
- 027 - Hashing, Masking, and Obfuscation.mp4 50MB
- 023 - Data Dispersion.mp4 50MB
- 067 - Approved APIs and Third-Party Software.mp4 49MB
- 084 - Backup and Restore Functions.mp4 48MB
- 015 - Secure Cloud Data Lifecycle.mp4 47MB
- 028 - Tokenization.mp4 47MB
- 096 - Conflicting International Legislation.mp4 47MB
- 083 - Performance, Capacity, and Hardware Monitoring.mp4 46MB
- 040 - Chain of Custody and Non-Repudiation.mp4 45MB
- 081 - Access Controls for Remote Access.mp4 44MB
- 053 - Identification, Authentication, and Authorization in Cloud Infrastructure.mp4 44MB
- 117 - Metrics for Risk Management.mp4 44MB
- 018 - Functional Security Requirements.mp4 42MB
- 105 - Assurance Challenges of Virtualization and Cloud.mp4 42MB
- 078 - Operating System (OS) Hardening through the Application of Baselines.mp4 42MB
- 109 - Internal Security Management System (ISMS).mp4 42MB
- 094 - Log Capture and Analysis.mp4 42MB
- 032 - Mapping, Labeling, and Sensitive Data.mp4 41MB
- 068 - Supplemental Security Components.mp4 41MB
- 121 - Contract Management.mp4 40MB
- 061 - Common Pitfalls and Vulnerabilities.mp4 40MB
- 071 - Federated Identity and Identity Providers.mp4 39MB
- 079 - Stand-Alone Hosts.mp4 39MB
- 030 - Data De-identification.mp4 39MB
- 035 - Data Deletion Procedures and Mechanisms.mp4 38MB
- 051 - Physical and Environmental Protection.mp4 38MB
- 122 - Supply Chain Management.mp4 37MB
- 093 - Security Operations Center (SOC) and Monitoring Security Controls.mp4 37MB
- 088 - Problem and Deployment Management.mp4 37MB
- 060 - Cloud Development Basics.mp4 37MB
- 099 - eDiscovery.mp4 36MB
- 011 - Data and Media Sanitization.mp4 35MB
- 123 - How to Prepare for the Exam.mp4 35MB
- 073 - Cloud Access Security Broker (CASB).mp4 35MB
- 070 - Sandboxing and Application Virtualization.mp4 34MB
- 087 - Information Security and Incident Management.mp4 34MB
- 119 - Business Requirements.mp4 34MB
- 074 - Hardware-Specific Security Configuration Requirements.mp4 33MB
- 112 - Impact of Distributed Information Technology (IT) Model.mp4 32MB
- 118 - Assessment of Risk Environment.mp4 31MB
- 100 - Forensics Requirements.mp4 29MB
- 114 - Data Owner_Controller vs. Data Custodian_Processor.mp4 27MB
- 091 - Evidence Management.mp4 26MB
- 111 - Specialized Compliance Requirements for Highly Regulated Industries.mp4 25MB
- 037 - Legal Hold.mp4 25MB
- 125 - What's Next After Certification.mp4 21MB
- 115 - Regulatory Transparency Requirements.mp4 21MB
- 097 - Legal Risks Specific to Cloud Computing.mp4 19MB
- 009 - Lab Preparation Video (Important).mp4 18MB
- 002 - About the Course.mp4 16MB
- 003 - Course Prerequisites.mp4 15MB
- 001 - About the Author.mp4 14MB
- 124 - Get Recognized.mp4 12MB