From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Program management, part 4
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Program management, part 4
- [Instructor] Welcome to the final lesson of this four-part series on program management. In this lesson, we have three final types of management to discuss. The first is service-level management, and then we'll cover availability management and capacity management. Starting with service-level management, in COD environments, this is pivotal for managing and fulfilling the defined requirements of a service with a common focus on availability. Service-level agreements, or SLAs, play a significant role in this process by formalizing the expected outcomes and facilitating measurements through specific metrics. Continuously monitoring and collecting feedback from customers is essential for meeting these service levels and driving continual service improvement. Additionally, compliance with SLAs is not only crucial for maintaining service standards and customer satisfaction, but in some cases avoiding penalties. Two key pillars that we can track as part of service-level management are of…
Contents
-
-
-
-
-
-
-
(Locked)
Domain 5 overview1m 57s
-
(Locked)
Hardware security4m 51s
-
(Locked)
Virtualization management, security, and tool sets5m 17s
-
(Locked)
Remote access4m 41s
-
(Locked)
Secure network configurations and controls12m 30s
-
(Locked)
Operating system hardening and configuration6m 46s
-
(Locked)
Availability of hosts and guest operating systems9m 14s
-
Performance, capacity, and hardware monitoring6m 27s
-
(Locked)
Infrastructure as code and the management plane6m 3s
-
(Locked)
Program management, part 18m 41s
-
(Locked)
Program management, part 28m 16s
-
(Locked)
Program management, part 37m 8s
-
(Locked)
Program management, part 46m 27s
-
(Locked)
Forensics, evidence collection, and preservation12m 16s
-
(Locked)
Communication and cloud stakeholders6m 57s
-
(Locked)
Security operations and intelligent monitoring6m 22s
-
(Locked)
Logging, incident management, and vulnerability assessments13m 18s
-
(Locked)
-