From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Verifications and certifications using common standards
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Verifications and certifications using common standards
- [Instructor] Welcome to the final lecture of module one, which is on the verification and certifications using common standards. As you might have guessed, in this lesson, we're going to be talking about verification using common standards, as well as some system product certifications in the industry. So the first set of standards we'll talk about is going to be the International Organization for Standardization or International Electrotechnical Commission. You don't need to memorize this name, but what you should be familiar with is this abbreviation right here, which is ISO/IEC. This organization has a variety of standards starting with the ISO 27001, which is a standard that's going to help us establish an information security management system, or ISMS. So this should be used by organizations to build their own ISMS. To complement that, ISO also has 27002, which is a framework to help build related security controls to enforce the standards that we came up with in the ISMS…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-