| Files: |
-
Get Bonus Downloads Here.url
180 bytes
-
01 - Introduction to CCSP.mp4
11.3 MB
-
01 - Introduction to CCSP.srt
9.2 KB
-
01 - Domain 1 overview.mp4
2.2 MB
-
01 - Domain 1 overview.srt
2.1 KB
-
02 - Cloud computing definitions, roles, and responsibilities.mp4
25.0 MB
-
02 - Cloud computing definitions, roles, and responsibilities.srt
20.1 KB
-
03 - Key cloud computing characteristics.mp4
16.0 MB
-
03 - Key cloud computing characteristics.srt
11.8 KB
-
04 - Building block technologies.mp4
13.0 MB
-
04 - Building block technologies.srt
12.3 KB
-
05 - Cloud activities, service capabilities and categories, and deployment models.mp4
16.2 MB
-
05 - Cloud activities, service capabilities and categories, and deployment models.srt
14.5 KB
-
06 - Cloud shared considerations.mp4
14.4 MB
-
06 - Cloud shared considerations.srt
12.8 KB
-
07 - Impact of related technologies.mp4
21.7 MB
-
07 - Impact of related technologies.srt
18.6 KB
-
08 - Cryptography and key management.mp4
6.9 MB
-
08 - Cryptography and key management.srt
6.8 KB
-
09 - Identity and access control.mp4
10.3 MB
-
09 - Identity and access control.srt
9.9 KB
-
10 - Data and media sanitization.mp4
6.8 MB
-
10 - Data and media sanitization.srt
6.6 KB
-
11 - Network security.mp4
16.3 MB
-
11 - Network security.srt
13.3 KB
-
12 - Virtualization security.mp4
17.1 MB
-
12 - Virtualization security.srt
15.9 KB
-
13 - Common threats.mp4
7.5 MB
-
13 - Common threats.srt
6.0 KB
-
14 - Security hygiene.mp4
12.1 MB
-
14 - Security hygiene.srt
11.2 KB
-
15 - Cloud secure data lifecycle.mp4
6.9 MB
-
15 - Cloud secure data lifecycle.srt
6.5 KB
-
16 - Business continuity and disaster recovery in the cloud.mp4
14.2 MB
-
16 - Business continuity and disaster recovery in the cloud.srt
12.1 KB
-
17 - Business impact analysis and functional security requirements.mp4
16.1 MB
-
17 - Business impact analysis and functional security requirements.srt
11.9 KB
-
18 - Service model security considerations and cloud design patterns.mp4
12.9 MB
-
18 - Service model security considerations and cloud design patterns.srt
9.7 KB
-
19 - DevOps security.mp4
6.4 MB
-
19 - DevOps security.srt
4.6 KB
-
20 - Verifications and certifications using common standards.mp4
13.8 MB
-
20 - Verifications and certifications using common standards.srt
9.7 KB
-
01 - Domain 2 overview.mp4
1.4 MB
-
01 - Domain 2 overview.srt
1.2 KB
-
02 - Cloud data life cycle, data dispersion, and data flows.mp4
14.7 MB
-
02 - Cloud data life cycle, data dispersion, and data flows.srt
14.3 KB
-
03 - Storage types.mp4
20.9 MB
-
03 - Storage types.srt
15.4 KB
-
04 - Storage threats.mp4
15.2 MB
-
04 - Storage threats.srt
12.0 KB
-
05 - Encryption and key management.mp4
25.3 MB
-
05 - Encryption and key management.srt
17.4 KB
-
06 - Hashing, data obfuscation, and tokenization.mp4
18.8 MB
-
06 - Hashing, data obfuscation, and tokenization.srt
16.1 KB
-
07 - Data loss prevention, keys, secrets, and certificates.mp4
21.4 MB
-
07 - Data loss prevention, keys, secrets, and certificates.srt
16.6 KB
-
08 - Different structures of data and data location.mp4
14.1 MB
-
08 - Different structures of data and data location.srt
12.7 KB
-
09 - Data classification policies.mp4
9.4 MB
-
09 - Data classification policies.srt
8.5 KB
-
10 - Data mapping and labeling.mp4
7.6 MB
-
10 - Data mapping and labeling.srt
7.5 KB
-
11 - Information rights management.mp4
12.8 MB
-
11 - Information rights management.srt
11.1 KB
-
12 - Data retention policies.mp4
15.7 MB
-
12 - Data retention policies.srt
13.7 KB
-
13 - Data deletion, archiving, and legal hold.mp4
16.6 MB
-
13 - Data deletion, archiving, and legal hold.srt
11.3 KB
-
14 - Enable data audit, trace, and accountability.mp4
16.6 MB
-
14 - Enable data audit, trace, and accountability.srt
12.7 KB
-
01 - Domain 3 overview.mp4
1.6 MB
-
02 - Physical environment.mp4
10.2 MB
-
02 - Physical environment.srt
7.6 KB
-
03 - Network communications and computing.mp4
9.7 MB
-
04 - Virtualization.mp4
13.0 MB
-
04 - Virtualization.srt
11.5 KB
-
05 - Storage.mp4
8.3 MB
-
05 - Storage.srt
7.3 KB
-
06 - Management plane.mp4
13.6 MB
-
06 - Management plane.srt
11.4 KB
-
07 - Design a secure data center.mp4
21.3 MB
-
07 - Design a secure data center.srt
16.3 KB
-
08 - Risk analysis.mp4
9.6 MB
-
08 - Risk analysis.srt
7.8 KB
-
09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.mp4
12.5 MB
-
09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.srt
11.2 KB
-
10 - Physical and environmental protection.mp4
9.4 MB
-
11 - System, storage, and communication protection.mp4
5.9 MB
-
11 - System, storage, and communication protection.srt
4.8 KB
-
12 - Identification, authentication, and authorization in the cloud.mp4
13.8 MB
-
12 - Identification, authentication, and authorization in the cloud.srt
10.5 KB
-
13 - Audit mechanisms.mp4
14.7 MB
-
13 - Audit mechanisms.srt
10.9 KB
-
14 - Business continuity (BC) and disaster recovery (DR) strategies.mp4
8.2 MB
-
14 - Business continuity (BC) and disaster recovery (DR) strategies.srt
6.5 KB
-
15 - Business requirements.mp4
11.8 MB
-
16 - BC and DR planning and testing.mp4
17.1 MB
-
16 - BC and DR planning and testing.srt
11.6 KB
-
01 - Domain 4 overview.mp4
3.6 MB
-
01 - Domain 4 overview.srt
3.6 KB
-
02 - Cloud development basics, common pitfalls, and vulnerabilities.mp4
28.4 MB
-
02 - Cloud development basics, common pitfalls, and vulnerabilities.srt
21.8 KB
-
03 - Secure software development.mp4
9.2 MB
-
03 - Secure software development.srt
6.9 KB
-
04 - Business requirements, phases, and methodologies.mp4
10.9 MB
-
04 - Business requirements, phases, and methodologies.srt
8.1 KB
-
05 - Cloud specific risks.mp4
20.9 MB
-
05 - Cloud specific risks.srt
16.7 KB
-
06 - Threat modeling.mp4
13.5 MB
-
06 - Threat modeling.srt
11.4 KB
-
07 - Layered security, secure coding, and configuration.mp4
8.8 MB
-
07 - Layered security, secure coding, and configuration.srt
6.1 KB
-
08 - Cloud software assurance and validation.mp4
15.0 MB
-
08 - Cloud software assurance and validation.srt
11.3 KB
-
09 - Application testing.mp4
12.4 MB
-
09 - Application testing.srt
8.4 KB
-
10 - Securing APIs and supply chains.mp4
7.0 MB
-
10 - Securing APIs and supply chains.srt
4.9 KB
-
11 - Validating and managing third-party and open-source software.mp4
7.7 MB
-
11 - Validating and managing third-party and open-source software.srt
6.1 KB
-
12 - Supplemental security components.mp4
16.8 MB
-
12 - Supplemental security components.srt
12.6 KB
-
13 - Cryptography, sandboxing, virtualization, and orchestration.mp4
22.2 MB
-
13 - Cryptography, sandboxing, virtualization, and orchestration.srt
14.9 KB
-
14 - Federated identity, identity providers (IdP), and SSO.mp4
13.4 MB
-
14 - Federated identity, identity providers (IdP), and SSO.srt
9.9 KB
-
15 - MFA, cloud access security brokers, and secrets management.mp4
12.9 MB
-
15 - MFA, cloud access security brokers, and secrets management.srt
9.4 KB
-
01 - Domain 5 overview.mp4
3.8 MB
-
01 - Domain 5 overview.srt
3.2 KB
-
02 - Hardware security.mp4
9.4 MB
-
02 - Hardware security.srt
6.9 KB
-
03 - Virtualization management, security, and tool sets.mp4
11.4 MB
-
03 - Virtualization management, security, and tool sets.srt
8.2 KB
-
04 - Remote access.mp4
9.3 MB
-
04 - Remote access.srt
7.1 KB
-
05 - Secure network configurations and controls.mp4
29.9 MB
-
05 - Secure network configurations and controls.srt
18.7 KB
-
06 - Operating system hardening and configuration.mp4
14.8 MB
-
06 - Operating system hardening and configuration.srt
10.4 KB
-
07 - Availability of hosts and guest operating systems.mp4
23.9 MB
-
07 - Availability of hosts and guest operating systems.srt
14.0 KB
-
08 - Performance, capacity, and hardware monitoring.mp4
14.4 MB
-
08 - Performance, capacity, and hardware monitoring.srt
10.2 KB
-
09 - Infrastructure as code and the management plane.mp4
14.3 MB
-
09 - Infrastructure as code and the management plane.srt
9.4 KB
-
10 - Program management, part 1.mp4
17.3 MB
-
10 - Program management, part 1.srt
12.6 KB
-
11 - Program management, part 2.mp4
17.1 MB
-
11 - Program management, part 2.srt
12.5 KB
-
12 - Program management, part 3.mp4
17.3 MB
-
12 - Program management, part 3.srt
12.4 KB
-
13 - Program management, part 4.mp4
14.1 MB
-
13 - Program management, part 4.srt
10.4 KB
-
14 - Forensics, evidence collection, and preservation.mp4
27.4 MB
-
14 - Forensics, evidence collection, and preservation.srt
20.3 KB
-
15 - Communication and cloud stakeholders.mp4
12.3 MB
-
15 - Communication and cloud stakeholders.srt
10.9 KB
-
16 - Security operations and intelligent monitoring.mp4
16.6 MB
-
16 - Security operations and intelligent monitoring.srt
10.3 KB
-
17 - Logging, incident management, and vulnerability assessments.mp4
30.2 MB
-
17 - Logging, incident management, and vulnerability assessments.srt
22.9 KB
-
01 - Domain 6 overview.mp4
3.7 MB
-
01 - Domain 6 overview.srt
3.5 KB
-
02 - Cloud legal requirements.mp4
10.0 MB
-
02 - Cloud legal requirements.srt
9.2 KB
-
03 - Legal frameworks and forensics.mp4
25.2 MB
-
03 - Legal frameworks and forensics.srt
20.5 KB
-
04 - Privacy in the cloud, part 1.mp4
14.0 MB
-
04 - Privacy in the cloud, part 1.srt
8.1 KB
-
05 - Privacy in the cloud, part 2.mp4
13.5 MB
-
05 - Privacy in the cloud, part 2.srt
8.7 KB
-
06 - Cloud auditing.mp4
19.0 MB
-
06 - Cloud auditing.srt
13.2 KB
-
07 - Audit analysis.mp4
17.7 MB
-
07 - Audit analysis.srt
12.8 KB
-
08 - Distributed infrastructure and compliance.mp4
20.6 MB
-
08 - Distributed infrastructure and compliance.srt
13.8 KB
-
09 - Enterprise risk management, part 1.mp4
13.8 MB
-
09 - Enterprise risk management, part 1.srt
10.9 KB
-
10 - Enterprise risk management, part 2.mp4
15.8 MB
-
10 - Enterprise risk management, part 2.srt
11.4 KB
-
11 - Outsourcing and cloud contracts.mp4
14.0 MB
-
11 - Outsourcing and cloud contracts.srt
10.4 KB
-
Bonus Resources.txt
70 bytes
|
Discussion