وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CCSK v5 Training- Prepare for Cloud Security Certification

سرفصل های دوره

Master Cloud Security and Prepare for the CCSK Certification


1 - Introduction
  • 1 - CCSK Course Introduction
  • 2 - How to get the most out of this course
  • 3 - About Trainer

  • 2 - Domain 1 Cloud Computing Concepts Architectures
  • 4 - Introduction to Cloud Computing
  • 5 - Cloud Deployment Models
  • 6 - Cloud Service Models
  • 7 - CSA Enterprise Architecture.html
  • 8 - NIST Cloud Reference Archiecture.html

  • 3 - Domain 2 Cloud Governance
  • 9 - Cloud Shared Responsibility Matrix
  • 10 - Policies
  • 11 - Cloud Policies and Data Residency
  • 12 - Contracting with Cloud Vendors
  • 13 - Understand ISO 27017 and Key Provisions
  • 14 - BSI C5 PCI SSC.html
  • 15 - NIST CSF.html
  • 16 - NIST SP 80053
  • 17 - CSA STAR CCM CAIQ
  • 18 - Cloud Governance.html
  • 19 - CCOE Cloud Advisory Council.html
  • 20 - Cloud Deployment Registery.html

  • 4 - Domain 3 Risk Audit Compliance
  • 21 - What is Risk Management
  • 22 - NIST Risk Management Framework
  • 23 - NIST SP 80030
  • 24 - ISO 27005 ISO 31000
  • 25 - Privacy Regulations
  • 26 - The EUUS Data Privacy Framework
  • 27 - Privacy Controls and EDiscovery

  • 5 - Domain 4 Organization Management
  • 28 - Cloud Organization Hierarchy models.html
  • 29 - CSP Policies.html
  • 30 - Cloud Security Posture Management CSPM.html
  • 31 - Cloud Workload Protection Platform CWPP.html
  • 32 - Cloud Native Application Protection Platform CNAPP.html
  • 33 - Hybrid and MultiCloud Strategies.html

  • 6 - Domain 5 Identity Access Management
  • 34 - Identity Access Management
  • 35 - Authorization Models and RBAC
  • 36 - Single signon SSO RSO MTLS
  • 37 - Key Access Control Concepts
  • 38 - Federated identity and IdP OpenID SAML Auth Protocols
  • 39 - SASE CASB

  • 7 - Domain 6 Security Monitoring
  • 40 - Threats and Vulnerabilities on Cloud
  • 41 - Security Vulnerabilities
  • 42 - Vulnerability Related Terms CVE CVSS
  • 43 - Advanced Persistent Threats
  • 44 - DOS DDOS Attacks
  • 45 - Performance Monitoring and KPI
  • 46 - Security Operation Center
  • 47 - Log Management
  • 48 - Threat Intelligence
  • 49 - Digital Risk Protection and Dark Web Monitoring

  • 8 - Domain 7 Infrastructure Networking
  • 50 - Understand Cloud Architecture Region AD
  • 51 - Understand the Multitenancy
  • 52 - Infrastructure as Code
  • 53 - API and API Gateway
  • 54 - Virtualization
  • 55 - Containers
  • 56 - Serverless Computing
  • 57 - Software Defined Network
  • 58 - Network Function Virtualization

  • 9 - Domain 8 Cloud Workload Security
  • 59 - Cloud Native Archiecture
  • 60 - Virtualization Security
  • 61 - Container Security
  • 62 - Docker Security
  • 63 - Kubernetes Security
  • 64 - Understand Security Controls
  • 65 - Best Practices in Control Selection
  • 66 - Defence in Depth Concept

  • 10 - Domain 9 Data Security
  • 67 - Cloud Data lifecycle
  • 68 - Data Storage and Retention and Archiving
  • 69 - Data dispersion in the Cloud and Data Flow
  • 70 - Data Disposal
  • 71 - Data Protection Policies Encryption and Classification
  • 72 - Data obfuscation Tokenization
  • 73 - Data loss prevention
  • 74 - Information Rights Management IRM
  • 75 - Secrets and Key Management

  • 11 - Domain 10 Application Security
  • 76 - OWASP Top 10
  • 77 - CWE Common Weak Enumeration
  • 78 - Threat Modeling
  • 79 - Secure Coding
  • 80 - Software Security Testing
  • 81 - DevOps
  • 82 - DevOps security
  • 83 - Penetration Testing
  • 84 - Bug Bounty Program

  • 12 - Domain 11 Incident Response Resilience
  • 85 - Incident management
  • 86 - Incident Response Plan
  • 87 - Forensic data collection methodologies
  • 88 - SIEM
  • 89 - BIA DRP BCP
  • 90 - RPO RTO
  • 91 - BCP Testing

  • 13 - Domain 12 Related Technologies Strategies
  • 92 - Zero Trust vs Trust but Verify
  • 93 - Artificial Intelligence and Machine Learning
  • 94 - Generative AI Overview
  • 95 - Types of AI Narrow General
  • 96 - Block Chain and raise of Quantum Computing
  • 97 - IoT and ICS
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42917
    حجم: 3643 مگابایت
    مدت زمان: 698 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید