Home Search Profile

Master Cloud Security: CCSK Certification Prep 2024

Focused View

11:37:22

  • 1 - CCSK Course Introduction.mp4
    04:39
  • 2 - How to get the most out of this course.mp4
    05:41
  • 3 - About Trainer.mp4
    02:11
  • 4 - Introduction to Cloud Computing.mp4
    08:30
  • 5 - Cloud Deployment Models.mp4
    05:47
  • 6 - Cloud Service Models.mp4
    08:34
  • 7 - CSA Enterprise Architecture.html
  • 8 - NIST Cloud Reference Archiecture.html
  • 9 - Cloud Shared Responsibility Matrix.mp4
    06:56
  • 10 - Policies.mp4
    04:46
  • 11 - Cloud Policies and Data Residency.mp4
    07:32
  • 12 - Contracting with Cloud Vendors.mp4
    08:26
  • 13 - Understand ISO 27017 and Key Provisions.mp4
    08:55
  • 14 - BSI C5 PCI SSC.html
  • 15 - NIST CSF.html
  • 16 - NIST SP 80053.mp4
    09:15
  • 17 - CSA STAR CCM CAIQ.mp4
    09:20
  • 18 - Cloud Governance.html
  • 19 - CCOE Cloud Advisory Council.html
  • 20 - Cloud Deployment Registery.html
  • 21 - What is Risk Management.mp4
    10:12
  • 22 - NIST Risk Management Framework.mp4
    05:58
  • 23 - NIST SP 80030.mp4
    08:44
  • 24 - ISO 27005 ISO 31000.mp4
    06:36
  • 25 - Privacy Regulations.mp4
    11:01
  • 26 - The EUUS Data Privacy Framework.mp4
    08:52
  • 27 - Privacy Controls and EDiscovery.mp4
    10:58
  • 28 - Cloud Organization Hierarchy models.html
  • 29 - CSP Policies.html
  • 30 - Cloud Security Posture Management CSPM.html
  • 31 - Cloud Workload Protection Platform CWPP.html
  • 32 - Cloud Native Application Protection Platform CNAPP.html
  • 33 - Hybrid and MultiCloud Strategies.html
  • 34 - Identity Access Management.mp4
    08:46
  • 35 - Authorization Models and RBAC.mp4
    11:15
  • 36 - Single signon SSO RSO MTLS.mp4
    05:52
  • 37 - Key Access Control Concepts.mp4
    05:18
  • 38 - Federated identity and IdP OpenID SAML Auth Protocols.mp4
    05:36
  • 39 - SASE CASB.mp4
    10:23
  • 40 - Threats and Vulnerabilities on Cloud.mp4
    08:21
  • 41 - Security Vulnerabilities.mp4
    05:15
  • 42 - Vulnerability Related Terms CVE CVSS.mp4
    04:50
  • 43 - Advanced Persistent Threats.mp4
    08:06
  • 44 - DOS DDOS Attacks.mp4
    09:06
  • 45 - Performance Monitoring and KPI.mp4
    05:34
  • 46 - Security Operation Center.mp4
    05:25
  • 47 - Log Management.mp4
    09:46
  • 48 - Threat Intelligence.mp4
    05:58
  • 49 - Digital Risk Protection and Dark Web Monitoring.mp4
    08:30
  • 50 - Understand Cloud Architecture Region AD.mp4
    12:14
  • 51 - Understand the Multitenancy.mp4
    06:45
  • 52 - Infrastructure as Code.mp4
    06:26
  • 53 - API and API Gateway.mp4
    08:07
  • 54 - Virtualization.mp4
    07:37
  • 55 - Containers.mp4
    07:37
  • 56 - Serverless Computing.mp4
    10:12
  • 57 - Software Defined Network.mp4
    12:30
  • 58 - Network Function Virtualization.mp4
    10:19
  • 59 - Cloud Native Archiecture.mp4
    10:50
  • 60 - Virtualization Security.mp4
    08:57
  • 61 - Container Security.mp4
    07:40
  • 62 - Docker Security.mp4
    09:20
  • 63 - Kubernetes Security.mp4
    08:48
  • 64 - Understand Security Controls.mp4
    11:26
  • 65 - Best Practices in Control Selection.mp4
    03:35
  • 66 - Defence in Depth Concept.mp4
    08:10
  • 67 - Cloud Data lifecycle.mp4
    03:45
  • 68 - Data Storage and Retention and Archiving.mp4
    05:44
  • 69 - Data dispersion in the Cloud and Data Flow.mp4
    05:10
  • 70 - Data Disposal.mp4
    04:39
  • 71 - Data Protection Policies Encryption and Classification.mp4
    08:19
  • 72 - Data obfuscation Tokenization.mp4
    06:47
  • 73 - Data loss prevention.mp4
    07:37
  • 74 - Information Rights Management IRM.mp4
    08:13
  • 75 - Secrets and Key Management.mp4
    06:21
  • 76 - OWASP Top 10.mp4
    09:31
  • 77 - CWE Common Weak Enumeration.mp4
    03:38
  • 78 - Threat Modeling.mp4
    06:18
  • 79 - Secure Coding.mp4
    13:31
  • 80 - Software Security Testing.mp4
    08:48
  • 81 - DevOps.mp4
    09:10
  • 82 - DevOps security.mp4
    09:19
  • 83 - Penetration Testing.mp4
    10:12
  • 84 - Bug Bounty Program.mp4
    05:23
  • 85 - Incident management.mp4
    10:26
  • 86 - Incident Response Plan.mp4
    15:37
  • 87 - Forensic data collection methodologies.mp4
    05:23
  • 88 - SIEM.mp4
    08:26
  • 89 - BIA DRP BCP.mp4
    17:21
  • 90 - RPO RTO.mp4
    12:35
  • 91 - BCP Testing.mp4
    07:45
  • 92 - Zero Trust vs Trust but Verify.mp4
    03:46
  • 93 - Artificial Intelligence and Machine Learning.mp4
    13:59
  • 94 - Generative AI Overview.mp4
    10:56
  • 95 - Types of AI Narrow General.mp4
    07:57
  • 96 - Block Chain and raise of Quantum Computing.mp4
    10:14
  • 97 - IoT and ICS.mp4
    19:05
  • More details


    Course Overview

    This comprehensive CCSK certification training equips you with essential cloud security skills, covering governance, risk management, infrastructure security, and emerging technologies to protect modern cloud environments.

    What You'll Learn

    • Cloud computing architectures and deployment models
    • Identity management (RBAC, SSO) and compliance frameworks
    • Container security (Docker, Kubernetes) and threat detection

    Who This Is For

    • IT professionals expanding cloud security knowledge
    • Cybersecurity specialists securing cloud systems
    • Cloud architects implementing secure infrastructures

    Key Benefits

    • Prepare for CCSK certification with real-world scenarios
    • Master ISO 27017, NIST frameworks, and OWASP Top 10
    • Learn incident response for cloud environments

    Curriculum Highlights

    1. Cloud Computing Concepts & Architectures
    2. Risk Management & Compliance
    3. Cloud Workload & Data Security
    Focused display
    • language english
    • Training sessions 84
    • duration 11:37:22
    • Release Date 2025/05/18

    Courses related to Microsoft Azure

    Courses related to Amazon AWS

    Courses related to Cloud Computing

    Courses related to Google Cloud