Author
Updated
9/18/2020Released
10/24/2019Note: This course is designed to cover the most recent version of the CCSP exam, released in August 2019.
- Hardware and visualization security configuration
- Securing local and remote access
- TCP/IP networking
- Public and private addressing
- Firewalls and network security groups
- Developing security baselines
- Performance and capacity monitoring
Skill Level Intermediate
Duration
Views
- We spend a lot of effort designing and building complex cloud architectures to meet our business objectives. At the same time, cybersecurity professionals invest a lot of time during this design and build phase ensuring that the security controls used in these environments will provide adequate protection for the confidentiality, integrity, and availability of information and systems. Once the design and build work ends, the work of cybersecurity professionals has only just begun. Cloud security professionals must understand how to operate secure cloud environments. And in this day and age of the DevOps philosophy, they must also understand that the design and build processes are actually an ongoing part of those operations. Businesses are constantly in need of skilled cyber security professionals with cloud backgrounds and the certified cloud security professional, or CCSP certification, is a path that many technologists follow to advance their careers in this high demand field. Hi, I'm Mike Chapple, and I'd like to invite you to watch my course on cloud security operations. It's part of a seven course series preparing you for the CCSP exam. I hope that you'll join me as we explore how you can securely operate your cloud computing environment.
Related Courses
-
CCSP Cert Prep: 2 Cloud Data Security
with Mike Chapple2h 4m Intermediate
-
Introduction
-
Cloud security operations1m 24s
-
Study resources1m 28s
-
-
1. Physical and Logical Infrastructure
-
2. Secure Infrastructure Operations
-
Security zones3m 25s
-
3. Network Operations
-
TCP/IP networking5m 10s
-
IP addressing and DHCP4m 5s
-
DNS4m 28s
-
Network ports3m 41s
-
ICMP4m 6s
-
Subnetting3m 32s
-
-
4. Network Security
-
Firewalls4m 2s
-
VPNs and VPN concentrators4m 33s
-
Network security groups2m 58s
-
-
5. Security Baselines and Standards
-
Host availability2m 35s
-
6. Monitoring
-
Managing a SOC1m 54s
-
The ITIL model3m 27s
-
7. Threat Assessment
-
Security assessment tools5m 21s
-
Assess threats3m 14s
-
Threat assessment techniques2m 31s
-
Penetration testing2m 36s
-
-
8. Incident Management
-
Incident communications plan2m 42s
-
Incident identification3m 59s
-
Escalation and notification2m 31s
-
Mitigation2m 15s
-
9. Investigations and Forensics
-
Evidence types3m 27s
-
Digital forensics3m 43s
-
Chain of custody1m 52s
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Cloud security operations