CCSP Cert Prep: 2 Cloud Data Security

CCSP Cert Prep: 2 Cloud Data Security
CCSP Cert Prep: 2 Cloud Data Security
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 2h 02m | 325 MB

Almost every organization stores data online. This information—whether it’s credit card transactions or email addresses—needs to be stored securely throughout its lifecycle. It’s a complex challenge unique to the cloud. That’s why businesses look to professionals, like the Certified Cloud Security Professional (CCSP). Earning the CCSP certification validates your cloud security knowledge and makes you stand out to potential employers. This course covers the second domain of the CCSP exam: Cloud Data Security. Discover how the cloud data life cycle guides security efforts in the cloud. Then learn how to design and apply data security technologies, implement data discovery, and create a data classification program. Instructor Mike Chapple also covers the key principles of information rights management in the cloud.

Topics include:

  • Block storage types
  • Cloud storage security threats
  • Encryption basics
  • Choosing encryption algorithms
  • Key management
  • Public key infrastructure (PKI)
  • Creating and revoking digital signatures
  • Securing common protocols
  • Data protection
  • Information management
  • Information rights management
  • Logging security events
  • Continuous security monitoring
Table of Contents

Introduction
1 Securing data in the cloud
2 What you need to know
3 Study resources
4 Cloud data lifecycle

Cloud Data Storage
5 Block storage types
6 Data dispersion
7 Cloud storage security threats

Encryption
8 Understanding encryption
9 Symmetric and asymmetric cryptography
10 Goals of cryptography
11 Choosing encryption algorithms

Key Management
12 Key exchange
13 Diffie-Hellman
14 Key escrow

Public Key Infrastructure
15 Trust models
16 PKI and digital certificates
17 Hash functions
18 Digital signatures
19 Creating a digital certificate
20 Revoking a digital certificate

Cryptographic Applications
21 TLS and SSL
22 Securing common protocols

Data Protection
23 Data anonymization
24 Data obfuscation
25 Don’t use the last four digits of SSNs
26 Data loss prevention

Information Management
27 Information classification
28 Data discovery
29 Information rights management
30 Intellectual property
31 Data security policies
32 eDiscovery and evidence preservation

Data Event Auditability
33 Security event logging
34 Tuning and configuring SIEMs
35 Continuous security monitoring
36 Chain of custody

Conclusion
37 What’s next