Master Cloud Security: CCSK Certification Prep 2024
Focused View
11:37:22
1 - CCSK Course Introduction.mp4
04:39
2 - How to get the most out of this course.mp4
05:41
3 - About Trainer.mp4
02:11
4 - Introduction to Cloud Computing.mp4
08:30
5 - Cloud Deployment Models.mp4
05:47
6 - Cloud Service Models.mp4
08:34
7 - CSA Enterprise Architecture.html
8 - NIST Cloud Reference Archiecture.html
9 - Cloud Shared Responsibility Matrix.mp4
06:56
10 - Policies.mp4
04:46
11 - Cloud Policies and Data Residency.mp4
07:32
12 - Contracting with Cloud Vendors.mp4
08:26
13 - Understand ISO 27017 and Key Provisions.mp4
08:55
14 - BSI C5 PCI SSC.html
15 - NIST CSF.html
16 - NIST SP 80053.mp4
09:15
17 - CSA STAR CCM CAIQ.mp4
09:20
18 - Cloud Governance.html
19 - CCOE Cloud Advisory Council.html
20 - Cloud Deployment Registery.html
21 - What is Risk Management.mp4
10:12
22 - NIST Risk Management Framework.mp4
05:58
23 - NIST SP 80030.mp4
08:44
24 - ISO 27005 ISO 31000.mp4
06:36
25 - Privacy Regulations.mp4
11:01
26 - The EUUS Data Privacy Framework.mp4
08:52
27 - Privacy Controls and EDiscovery.mp4
10:58
28 - Cloud Organization Hierarchy models.html
29 - CSP Policies.html
30 - Cloud Security Posture Management CSPM.html
31 - Cloud Workload Protection Platform CWPP.html
32 - Cloud Native Application Protection Platform CNAPP.html
33 - Hybrid and MultiCloud Strategies.html
34 - Identity Access Management.mp4
08:46
35 - Authorization Models and RBAC.mp4
11:15
36 - Single signon SSO RSO MTLS.mp4
05:52
37 - Key Access Control Concepts.mp4
05:18
38 - Federated identity and IdP OpenID SAML Auth Protocols.mp4
05:36
39 - SASE CASB.mp4
10:23
40 - Threats and Vulnerabilities on Cloud.mp4
08:21
41 - Security Vulnerabilities.mp4
05:15
42 - Vulnerability Related Terms CVE CVSS.mp4
04:50
43 - Advanced Persistent Threats.mp4
08:06
44 - DOS DDOS Attacks.mp4
09:06
45 - Performance Monitoring and KPI.mp4
05:34
46 - Security Operation Center.mp4
05:25
47 - Log Management.mp4
09:46
48 - Threat Intelligence.mp4
05:58
49 - Digital Risk Protection and Dark Web Monitoring.mp4
08:30
50 - Understand Cloud Architecture Region AD.mp4
12:14
51 - Understand the Multitenancy.mp4
06:45
52 - Infrastructure as Code.mp4
06:26
53 - API and API Gateway.mp4
08:07
54 - Virtualization.mp4
07:37
55 - Containers.mp4
07:37
56 - Serverless Computing.mp4
10:12
57 - Software Defined Network.mp4
12:30
58 - Network Function Virtualization.mp4
10:19
59 - Cloud Native Archiecture.mp4
10:50
60 - Virtualization Security.mp4
08:57
61 - Container Security.mp4
07:40
62 - Docker Security.mp4
09:20
63 - Kubernetes Security.mp4
08:48
64 - Understand Security Controls.mp4
11:26
65 - Best Practices in Control Selection.mp4
03:35
66 - Defence in Depth Concept.mp4
08:10
67 - Cloud Data lifecycle.mp4
03:45
68 - Data Storage and Retention and Archiving.mp4
05:44
69 - Data dispersion in the Cloud and Data Flow.mp4
05:10
70 - Data Disposal.mp4
04:39
71 - Data Protection Policies Encryption and Classification.mp4
08:19
72 - Data obfuscation Tokenization.mp4
06:47
73 - Data loss prevention.mp4
07:37
74 - Information Rights Management IRM.mp4
08:13
75 - Secrets and Key Management.mp4
06:21
76 - OWASP Top 10.mp4
09:31
77 - CWE Common Weak Enumeration.mp4
03:38
78 - Threat Modeling.mp4
06:18
79 - Secure Coding.mp4
13:31
80 - Software Security Testing.mp4
08:48
81 - DevOps.mp4
09:10
82 - DevOps security.mp4
09:19
83 - Penetration Testing.mp4
10:12
84 - Bug Bounty Program.mp4
05:23
85 - Incident management.mp4
10:26
86 - Incident Response Plan.mp4
15:37
87 - Forensic data collection methodologies.mp4
05:23
88 - SIEM.mp4
08:26
89 - BIA DRP BCP.mp4
17:21
90 - RPO RTO.mp4
12:35
91 - BCP Testing.mp4
07:45
92 - Zero Trust vs Trust but Verify.mp4
03:46
93 - Artificial Intelligence and Machine Learning.mp4
13:59
94 - Generative AI Overview.mp4
10:56
95 - Types of AI Narrow General.mp4
07:57
96 - Block Chain and raise of Quantum Computing.mp4
10:14
97 - IoT and ICS.mp4
19:05
More details
Course Overview
This comprehensive CCSK certification training equips you with essential cloud security skills, covering governance, risk management, infrastructure security, and emerging technologies to protect modern cloud environments.
What You'll Learn
- Cloud computing architectures and deployment models
- Identity management (RBAC, SSO) and compliance frameworks
- Container security (Docker, Kubernetes) and threat detection
Who This Is For
- IT professionals expanding cloud security knowledge
- Cybersecurity specialists securing cloud systems
- Cloud architects implementing secure infrastructures
Key Benefits
- Prepare for CCSK certification with real-world scenarios
- Master ISO 27017, NIST frameworks, and OWASP Top 10
- Learn incident response for cloud environments
Curriculum Highlights
- Cloud Computing Concepts & Architectures
- Risk Management & Compliance
- Cloud Workload & Data Security
Focused display
- language english
- Training sessions 84
- duration 11:37:22
- Release Date 2025/05/18