Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CCSP Cert Prep: 5 Cloud Security Operations

Description

Learn how security operations function in the world of cloud computing as you prepare for the fifth domain of the Certified Cloud Security Professional (CCSP) exam.

Tags

Syllabus

Syllabus IntroductionCloud security operationsWhat you need to knowStudy resources1. Physical and Logical InfrastructureHardware security configurationHardware security modulesVirtualization security configuration2. Secure Infrastructure OperationsSecuring local and remote accessSecurity zonesBuilding lines of communication3. Network OperationsTCP/IP networkingIP addressing and DHCPDNSNetwork portsICMPPublic and private addressingSubnettingVLANs and network segmentation4. Network SecurityFirewallsNetwork security groupsVPNs and VPN concentratorsNetwork intrusion detection and preventionZero trust networking5. Security Baselines and StandardsDeveloping security baselinesLeveraging industry standardsCustomizing security standardsHost availability6. MonitoringPerformance and capacity monitoringManaging an SOCThe ITIL model7. Threat and Vulnerability ManagementWhat is vulnerability management?Analyzing scan reportsCorrelating scan resultsPenetration testingDeception technologies8. Incident ManagementBuilding an incident response programCreating an incident response teamIncident communications planIncident identificationEscalation and notificationMitigationContainment techniquesIncident eradication and recoveryValidationPost-incident activitiesIncident response exercises9. Investigations and ForensicsConducting investigationsEvidence typesDigital forensicsChain of custodyWhat's NextContinuing your CCSP certification journey Read more


CCSP Cert Prep: 5 Cloud Security Operations

Affiliate notice

Learn how security operations function in the world of cloud computing as you prepare for the fifth domain of the Certified Cloud Security Professional (CCSP) exam.

Syllabus IntroductionCloud security operationsWhat you need to knowStudy resources1. Physical and Logical InfrastructureHardware security configurationHardware security modulesVirtualization security configuration2. Secure Infrastructure OperationsSecuring local and remote accessSecurity zonesBuilding lines of communication3. Network OperationsTCP/IP networkingIP addressing and DHCPDNSNetwork portsICMPPublic and private addressingSubnettingVLANs and network segmentation4. Network SecurityFirewallsNetwork security groupsVPNs and VPN concentratorsNetwork intrusion detection and preventionZero trust networking5. Security Baselines and StandardsDeveloping security baselinesLeveraging industry standardsCustomizing security standardsHost availability6. MonitoringPerformance and capacity monitoringManaging an SOCThe ITIL model7. Threat and Vulnerability ManagementWhat is vulnerability management?Analyzing scan reportsCorrelating scan resultsPenetration testingDeception technologies8. Incident ManagementBuilding an incident response programCreating an incident response teamIncident communications planIncident identificationEscalation and notificationMitigationContainment techniquesIncident eradication and recoveryValidationPost-incident activitiesIncident response exercises9. Investigations and ForensicsConducting investigationsEvidence typesDigital forensicsChain of custodyWhat's NextContinuing your CCSP certification journey Read more