Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CCSP Cert Prep: 2 Data Security

Description

Get the detailed info you need to prepare for the Cloud Data Security domain of the CCSP exam. The course is mapped to the objectives used in the August 2022 exam release.

Tags

Syllabus

Syllabus IntroductionSecuring data in the cloudWhat you need to knowStudy resourcesCloud data lifecycle1. Cloud Data StorageBlock storage typesData dispersionCloud storage security threats2. EncryptionUnderstanding encryptionSymmetric and asymmetric cryptographyGoals of cryptographyChoosing encryption algorithms3. Key ManagementCryptographic Key SecurityKey exchangeDiffie-HellmanKey escrowHardware security modules4. Public Key InfrastructureTrust modelsPKI and digital certificatesHash functionsDigital signaturesCreating a digital certificateRevoking a digital certificate5. Cryptographic ApplicationsTLS and SSLIPsecSecuring common protocols6. Data ProtectionData anonymizationData obfuscationData loss prevention7. Information ManagementInformation classificationData discoveryInformation rights managementIntellectual propertyData security policieseDiscovery and evidence preservation8. Data Event AuditabilitySecurity event loggingTuning and configuring SIEMsContinuous security monitoringChain of custodyConclusionContinuing your CCSP certification journey Read more


CCSP Cert Prep: 2 Data Security

Affiliate notice

Get the detailed info you need to prepare for the Cloud Data Security domain of the CCSP exam. The course is mapped to the objectives used in the August 2022 exam release.

Syllabus IntroductionSecuring data in the cloudWhat you need to knowStudy resourcesCloud data lifecycle1. Cloud Data StorageBlock storage typesData dispersionCloud storage security threats2. EncryptionUnderstanding encryptionSymmetric and asymmetric cryptographyGoals of cryptographyChoosing encryption algorithms3. Key ManagementCryptographic Key SecurityKey exchangeDiffie-HellmanKey escrowHardware security modules4. Public Key InfrastructureTrust modelsPKI and digital certificatesHash functionsDigital signaturesCreating a digital certificateRevoking a digital certificate5. Cryptographic ApplicationsTLS and SSLIPsecSecuring common protocols6. Data ProtectionData anonymizationData obfuscationData loss prevention7. Information ManagementInformation classificationData discoveryInformation rights managementIntellectual propertyData security policieseDiscovery and evidence preservation8. Data Event AuditabilitySecurity event loggingTuning and configuring SIEMsContinuous security monitoringChain of custodyConclusionContinuing your CCSP certification journey Read more