From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Cryptography, sandboxing, virtualization, and orchestration
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Cryptography, sandboxing, virtualization, and orchestration
- [Presenter] Welcome to this lesson on cryptography, sandboxing, virtualization, and orchestration. Of course, in this lesson, the objectives are going to be to discuss some key concepts related to each of these four topics, cryptography, sandboxing, virtualization, and finally, orchestration. Starting with cryptography, I think we've established sufficiently that cryptography and the process of encryption and encrypting data, both at rest and in transit, is a critical aspect of securing components and information in this digital world. That doesn't change at all in the realm of cloud computing, and it is equally, if not more so important for protecting our sensitive data. This serves as the primary defense for data confidentiality. And that encompasses encryption at, again, those various states being data at rest and data in motion. Another critical component here is the management of the keys that we're using to protect that data. And many cloud service providers offer encryption…
Contents
-
-
-
-
-
-
(Locked)
Domain 4 overview1m 59s
-
(Locked)
Cloud development basics, common pitfalls, and vulnerabilities13m 6s
-
(Locked)
Secure software development4m 8s
-
(Locked)
Business requirements, phases, and methodologies4m 53s
-
(Locked)
Cloud specific risks10m 21s
-
(Locked)
Threat modeling7m 19s
-
(Locked)
Layered security, secure coding, and configuration4m 11s
-
Cloud software assurance and validation6m 48s
-
(Locked)
Application testing5m 13s
-
(Locked)
Securing APIs and supply chains3m 8s
-
(Locked)
Validating and managing third-party and open-source software3m 54s
-
(Locked)
Supplemental security components8m 19s
-
(Locked)
Cryptography, sandboxing, virtualization, and orchestration9m 31s
-
(Locked)
Federated identity, identity providers (IdP), and SSO6m 10s
-
(Locked)
MFA, cloud access security brokers, and secrets management5m 35s
-
(Locked)
-
-