From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Common threats
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Common threats
- [Narrator] Welcome to this lesson on common threats. In this lesson, we're going to go over three common threat and vulnerability frameworks, which are going to be the Cloud Security Alliance's Egregious 11, the OWASP Cloud-Native Application Security Top 10, as well as the original OWASP Top 10. We're going to very briefly cover these topics. However, for the purposes of the exam, I highly recommend spending time studying the vulnerabilities in these lists as it will come up in the exam. We will also be covering some of these frameworks multiple times throughout the course, which again, is why we're going to be going through these fairly quickly. First off, we have the CSA Egregious 11, which is a list of the most common threats to specifically to cloud applications. From the perspective of CSA research right away, you're going to see some threats here that are certainly significantly impactful to the cloud, but aren't necessarily unique to a cloud environment. For example, data…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-