From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Domain 5 overview
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Domain 5 overview
- [Narrator] Welcome to module five of this course where the key topic is Cloud Security Operations. This first lesson will be a domain five overview, where of course we'll introduce domain five, which similarly covers cloud security operations. Domain five makes up 16% of the CCSP exam, which is slightly less than some of the others, but still obviously a significant percentage. Cloud security operations also have a broader context in cloud security knowledge as a whole, so it'll be important to put the necessary effort into this module. The four key topics we'll go over throughout the course of this module are going to be security and virtualization management, where we'll talk about critical aspects of securing virtualized components in the cloud, including things like hardware security, virtualization, security, and the tools and practices for managing these environments effectively. We'll then talk about secure network and OS configurations, which will cover the essentials of…
Contents
-
-
-
-
-
-
-
(Locked)
Domain 5 overview1m 57s
-
(Locked)
Hardware security4m 51s
-
(Locked)
Virtualization management, security, and tool sets5m 17s
-
(Locked)
Remote access4m 41s
-
(Locked)
Secure network configurations and controls12m 30s
-
(Locked)
Operating system hardening and configuration6m 46s
-
(Locked)
Availability of hosts and guest operating systems9m 14s
-
Performance, capacity, and hardware monitoring6m 27s
-
(Locked)
Infrastructure as code and the management plane6m 3s
-
(Locked)
Program management, part 18m 41s
-
(Locked)
Program management, part 28m 16s
-
(Locked)
Program management, part 37m 8s
-
(Locked)
Program management, part 46m 27s
-
(Locked)
Forensics, evidence collection, and preservation12m 16s
-
(Locked)
Communication and cloud stakeholders6m 57s
-
(Locked)
Security operations and intelligent monitoring6m 22s
-
(Locked)
Logging, incident management, and vulnerability assessments13m 18s
-
(Locked)
-