Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CCSP Cert Prep: 5 Cloud Security Operations

Description

Learn how security operations function in the world of cloud computing as you prepare for the fifth domain of the Certified Cloud Security Professional (CCSP) exam.

Tags

Syllabus

Syllabus IntroductionCloud security operationsWhat you need to knowStudy resources1. Physical and Logical InfrastructureHardware security configurationVirtualization security configuration2. Secure Infrastructure OperationsSecuring local and remote accessSecurity zonesBuilding lines of communication3. Network OperationsTCP/IP networkingIP addressing and DHCPDNSNetwork portsICMPPublic and private addressingSubnettingVLANs and network segmentation4. Network SecurityFirewallsNetwork intrusion detection and preventionVPNs and VPN concentratorsNetwork security groups5. Security Baselines and StandardsDeveloping security baselinesLeveraging industry standardsCustomizing security standardsHost availability6. MonitoringPerformance and capacity monitoringManaging a SOCThe ITIL model7. Threat AssessmentSecurity assessment toolsScan for threats and vulnerabilitiesAssess threatsThreat assessment techniquesPenetration testing8. Incident ManagementBuild an incident response programIncident communications planIncident identificationEscalation and notificationMitigationRecovery and reconstitutionLessons Learned and reporting9. Investigations and ForensicsConducting investigationsEvidence typesDigital forensicsChain of custodyConclusionContinuing your CCSP certification journey Read more


CCSP Cert Prep: 5 Cloud Security Operations

Affiliate notice

Learn how security operations function in the world of cloud computing as you prepare for the fifth domain of the Certified Cloud Security Professional (CCSP) exam.

Syllabus IntroductionCloud security operationsWhat you need to knowStudy resources1. Physical and Logical InfrastructureHardware security configurationVirtualization security configuration2. Secure Infrastructure OperationsSecuring local and remote accessSecurity zonesBuilding lines of communication3. Network OperationsTCP/IP networkingIP addressing and DHCPDNSNetwork portsICMPPublic and private addressingSubnettingVLANs and network segmentation4. Network SecurityFirewallsNetwork intrusion detection and preventionVPNs and VPN concentratorsNetwork security groups5. Security Baselines and StandardsDeveloping security baselinesLeveraging industry standardsCustomizing security standardsHost availability6. MonitoringPerformance and capacity monitoringManaging a SOCThe ITIL model7. Threat AssessmentSecurity assessment toolsScan for threats and vulnerabilitiesAssess threatsThreat assessment techniquesPenetration testing8. Incident ManagementBuild an incident response programIncident communications planIncident identificationEscalation and notificationMitigationRecovery and reconstitutionLessons Learned and reporting9. Investigations and ForensicsConducting investigationsEvidence typesDigital forensicsChain of custodyConclusionContinuing your CCSP certification journey Read more