589689.xyz

390 - Certified Cloud Security Professional (CCSP)

  • 收录时间:2020-01-13 19:24:15
  • 文件大小:7GB
  • 下载次数:48
  • 最近下载:2020-11-24 02:08:47
  • 磁力链接:

文件列表

  1. 005 - Cloud Computing Activities and Service Categories.mp4 167MB
  2. 058 - Creating a BCDR Plan.mp4 148MB
  3. 047 - Environmental Design.mp4 147MB
  4. 026 - Encryption and Key Management.mp4 139MB
  5. 098 - Legal Frameworks and Guidelines.mp4 138MB
  6. 014 - Common Threats.mp4 138MB
  7. 020 - Verification Against Criteria.mp4 134MB
  8. 090 - Forensic Data Collection Methodologies.mp4 127MB
  9. 082 - Patch Management.mp4 117MB
  10. 059 - Testing a BCDR Plan.mp4 116MB
  11. 062 - Business Requirements and Phases_Methodologies.mp4 112MB
  12. 045 - Logical Design.mp4 104MB
  13. 004 - Roles, Characteristics and Building Block Technologies.mp4 104MB
  14. 077 - Secure Network Configuration.mp4 100MB
  15. 043 - Compute and Virtualization.mp4 98MB
  16. 016 - Cloud-Based Disaster Recovery (DR) and Business Continuity (BC).mp4 98MB
  17. 046 - Physical Design.mp4 94MB
  18. 080 - Availability of Clustered Hosts and Guest OSs.mp4 91MB
  19. 013 - Network Security and Virtualization Security.mp4 90MB
  20. 006 - Cloud Deployment Models.mp4 90MB
  21. 033 - IRM Objectives and Tools.mp4 89MB
  22. 048 - Risk Assessment and Analysis.mp4 88MB
  23. 102 - Country-Specific Legislation Related to Private Data.mp4 87MB
  24. 008 - Impact of Related Technologies.mp4 86MB
  25. 038 - Definition of Event Sources and Requirements.mp4 85MB
  26. 029 - Data Loss Prevention (DLP).mp4 83MB
  27. 010 - Cryptography and Key Management.mp4 83MB
  28. 066 - Functional Testing and Security Testing Methodologies.mp4 82MB
  29. 044 - Storage and Management Plane.mp4 81MB
  30. 085 - Network Security Controls and Management Plane.mp4 78MB
  31. 055 - Risks Related to the Cloud Environment.mp4 77MB
  32. 041 - Physical Environment.mp4 76MB
  33. 025 - Threats to Storage Types.mp4 75MB
  34. 007 - Cloud Shared Considerations.mp4 74MB
  35. 069 - Cryptography.mp4 73MB
  36. 056 - Business Requirements.mp4 73MB
  37. 116 - Risk Treatment and Frameworks.mp4 72MB
  38. 086 - Change and Continuity Management.mp4 71MB
  39. 110 - Policies and Involvement of Relevant Stakeholders.mp4 70MB
  40. 039 - Logging, Storage, and Analysis of Data Events.mp4 70MB
  41. 052 - System and Communication Protection.mp4 70MB
  42. 076 - Configure Access Control for Local and Remote Access.mp4 69MB
  43. 092 - Managing Communications.mp4 68MB
  44. 022 - Cloud Data Lifecycle Phases.mp4 68MB
  45. 063 - Avoid Common Vulnerabilities During Development.mp4 67MB
  46. 017 - Cost-Benefit Analysis.mp4 67MB
  47. 054 - Audit Mechanisms.mp4 66MB
  48. 012 - Access Control.mp4 65MB
  49. 036 - Data Archival Procedures and Mechanisms.mp4 65MB
  50. 089 - Additional Operational Management.mp4 65MB
  51. 049 - Cloud Vulnerabilities, Risks, Threats, and Attacks.mp4 63MB
  52. 120 - Vendor Management.mp4 61MB
  53. 019 - Security Considerations for Different Cloud Categories.mp4 60MB
  54. 095 - Incident Management.mp4 59MB
  55. 113 - Assess Providers' Risk Management Programs.mp4 58MB
  56. 057 - Business Continuity_Disaster Recovery Strategy.mp4 57MB
  57. 075 - Virtualization Management Toolsets.mp4 56MB
  58. 108 - Gap Analysis and Audit Planning.mp4 55MB
  59. 104 - Audit Controls and Requirements.mp4 55MB
  60. 021 - System and Subsystem Product Certifications.mp4 55MB
  61. 042 - Network and Communications.mp4 54MB
  62. 101 - Contractual vs. Regulated Private Data.mp4 54MB
  63. 050 - Countermeasure Strategies.mp4 54MB
  64. 034 - Data Retention Policies.mp4 54MB
  65. 072 - Single Sign-On (SSO) and Multi-Factor Authentication (MFA).mp4 54MB
  66. 031 - Structured and Unstructured Data.mp4 54MB
  67. 064 - Cloud-Specific Risks and Quality Assurance.mp4 53MB
  68. 106 - Types of Audit Reports.mp4 52MB
  69. 024 - Storage Types.mp4 52MB
  70. 065 - Threat Modeling and Configuration Management.mp4 51MB
  71. 107 - Restrictions of Audit Scope Statements.mp4 50MB
  72. 103 - Jurisdictional Differences and Standard Privacy Requirements.mp4 50MB
  73. 027 - Hashing, Masking, and Obfuscation.mp4 50MB
  74. 023 - Data Dispersion.mp4 50MB
  75. 067 - Approved APIs and Third-Party Software.mp4 49MB
  76. 084 - Backup and Restore Functions.mp4 48MB
  77. 015 - Secure Cloud Data Lifecycle.mp4 47MB
  78. 028 - Tokenization.mp4 47MB
  79. 096 - Conflicting International Legislation.mp4 47MB
  80. 083 - Performance, Capacity, and Hardware Monitoring.mp4 46MB
  81. 040 - Chain of Custody and Non-Repudiation.mp4 45MB
  82. 081 - Access Controls for Remote Access.mp4 44MB
  83. 053 - Identification, Authentication, and Authorization in Cloud Infrastructure.mp4 44MB
  84. 117 - Metrics for Risk Management.mp4 44MB
  85. 018 - Functional Security Requirements.mp4 42MB
  86. 105 - Assurance Challenges of Virtualization and Cloud.mp4 42MB
  87. 078 - Operating System (OS) Hardening through the Application of Baselines.mp4 42MB
  88. 109 - Internal Security Management System (ISMS).mp4 42MB
  89. 094 - Log Capture and Analysis.mp4 42MB
  90. 032 - Mapping, Labeling, and Sensitive Data.mp4 41MB
  91. 068 - Supplemental Security Components.mp4 41MB
  92. 121 - Contract Management.mp4 40MB
  93. 061 - Common Pitfalls and Vulnerabilities.mp4 40MB
  94. 071 - Federated Identity and Identity Providers.mp4 39MB
  95. 079 - Stand-Alone Hosts.mp4 39MB
  96. 030 - Data De-identification.mp4 39MB
  97. 035 - Data Deletion Procedures and Mechanisms.mp4 38MB
  98. 051 - Physical and Environmental Protection.mp4 38MB
  99. 122 - Supply Chain Management.mp4 37MB
  100. 093 - Security Operations Center (SOC) and Monitoring Security Controls.mp4 37MB
  101. 088 - Problem and Deployment Management.mp4 37MB
  102. 060 - Cloud Development Basics.mp4 37MB
  103. 099 - eDiscovery.mp4 36MB
  104. 011 - Data and Media Sanitization.mp4 35MB
  105. 123 - How to Prepare for the Exam.mp4 35MB
  106. 073 - Cloud Access Security Broker (CASB).mp4 35MB
  107. 070 - Sandboxing and Application Virtualization.mp4 34MB
  108. 087 - Information Security and Incident Management.mp4 34MB
  109. 119 - Business Requirements.mp4 34MB
  110. 074 - Hardware-Specific Security Configuration Requirements.mp4 33MB
  111. 112 - Impact of Distributed Information Technology (IT) Model.mp4 32MB
  112. 118 - Assessment of Risk Environment.mp4 31MB
  113. 100 - Forensics Requirements.mp4 29MB
  114. 114 - Data Owner_Controller vs. Data Custodian_Processor.mp4 27MB
  115. 091 - Evidence Management.mp4 26MB
  116. 111 - Specialized Compliance Requirements for Highly Regulated Industries.mp4 25MB
  117. 037 - Legal Hold.mp4 25MB
  118. 125 - What's Next After Certification.mp4 21MB
  119. 115 - Regulatory Transparency Requirements.mp4 21MB
  120. 097 - Legal Risks Specific to Cloud Computing.mp4 19MB
  121. 009 - Lab Preparation Video (Important).mp4 18MB
  122. 002 - About the Course.mp4 16MB
  123. 003 - Course Prerequisites.mp4 15MB
  124. 001 - About the Author.mp4 14MB
  125. 124 - Get Recognized.mp4 12MB