1.1 Domain 3 CCSP.pdf
1.2 Guardians domain 3 for Udemy.pdf
1.3 SecaaS Cat 4 Email Security Implementation Guidance.pdf
1. Intro to Platform and Infrastructure
2. Architecture
3. Compute, Storage and Network
4. Intro to Networking & Switches
5. Virtual and Virtualized LANs
6. IP & Routers
7. Software Defined Networking (SDN)
8. Content Defined Networking (CDN)
9. Virtual Private Networks
10. Domain Name System (DNS)
11. OS Hardening
12. DRS and DO
13. NSG and SAN
14. Data Storage
15. RAID & Erasure Coding
16. Egregious 11 Number 1-5
17.1 The-Egregious-11-Cloud-Computing-Top-Threats-in-2019-April2020.pdf
17.2 Top-Threats-to-Cloud-Computing-Egregious-Eleven-Deep-Dive-090920 (1).pdf
17.3 TopThreatstoCloudComputingPandemicEleven060622.pdf
17. Egregious 11 Number 6-11
18. Treacherous 12
19.1 SecaaS Cat 5 Security Assessments Implementation Guidance.pdf
19. Risk Appetite
20. Risk Tolerance
21. Basic Risk terms
22. Quantitative Risk Assessment
23. Qualitative Risk Assessment
24. Risk Response
25.1 SecaaS Cat 1 IAM Implementation Guidance.pdf
25. Basic IAAA intro
26. Authorization and RBAC
27. Attribute Based Access Control (ABAC)
28. Single Sign-On (SSO)
29.1 saml-101-white-paper.pdf
29. SAML
30. OAuth and OpenID
31. CASB
32.1 SecaaS Cat 3 Web Security Implementation Guidance.pdf
32. Firewalls
33. IDS and IPS
34. Micro Segmentation
35. Hyper Segmentation
36. Blast Radius
37. Database and File Activity Monitors
38.1 SecaaS Cat 2 DLP Implementation Guidance.pdf
38. Data Leak Prevention (DLP)
39. Hot & Cold Air Aisles
40.1 uptime institue tiers.zip
40. Data Center Tiers
41.1 ENISA Cloud Computing Security Risk Assessment.pdf
41. BCM Introduction
42. The beginning of BCPDRP planning
43. Business Impact Assessment part 1
44. Business Impact Assessment - MTD & RTO
45. Business Impact Assessment - RTO & RPO
46. Business Impact Assessment -SDO & RSL
47. Recovery Strategies
48. Testing of the Plan
49. Embed in the User Community