CCSP Cert Prep: 5 Cloud Security Operations

Go to class
Write Review

Free Online Course: CCSP Cert Prep: 5 Cloud Security Operations provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CCSP Cert Prep: 5 Cloud Security Operations is taught by Mike Chapple.

Overview
  • Learn how security operations function in the world of cloud computing as you prepare for the fifth domain of the Certified Cloud Security Professional (CCSP) exam.

Syllabus
  • Introduction

    • Cloud security operations
    • What you need to know
    • Study resources
    1. Physical and Logical Infrastructure
    • Hardware security configuration
    • Hardware security modules
    • Virtualization security configuration
    2. Secure Infrastructure Operations
    • Securing local and remote access
    • Security zones
    • Building lines of communication
    3. Network Operations
    • TCP/IP networking
    • IP addressing and DHCP
    • DNS
    • Network ports
    • ICMP
    • Public and private addressing
    • Subnetting
    • VLANs and network segmentation
    4. Network Security
    • Firewalls
    • Network security groups
    • VPNs and VPN concentrators
    • Network intrusion detection and prevention
    • Zero trust networking
    5. Security Baselines and Standards
    • Developing security baselines
    • Leveraging industry standards
    • Customizing security standards
    • Host availability
    6. Monitoring
    • Performance and capacity monitoring
    • Managing an SOC
    • The ITIL model
    7. Threat and Vulnerability Management
    • What is vulnerability management?
    • Analyzing scan reports
    • Correlating scan results
    • Penetration testing
    • Deception technologies
    8. Incident Management
    • Building an incident response program
    • Creating an incident response team
    • Incident communications plan
    • Incident identification
    • Escalation and notification
    • Mitigation
    • Containment techniques
    • Incident eradication and recovery
    • Validation
    • Post-incident activities
    • Incident response exercises
    9. Investigations and Forensics
    • Conducting investigations
    • Evidence types
    • Digital forensics
    • Chain of custody
    What's Next
    • Continuing your CCSP certification journey