وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CCSK v5 Training- Prepare for Cloud Security Certification

سرفصل های دوره

Master Cloud Security and Prepare for the CCSK Certification


1 - Introduction
  • 1 - CCSK Course Introduction
  • 2 - How to get the most out of this course
  • 3 - About Trainer

  • 2 - Domain 1 Cloud Computing Concepts Architectures
  • 4 - Introduction to Cloud Computing
  • 5 - Cloud Deployment Models
  • 6 - Cloud Service Models
  • 7 - CSA Enterprise Architecture.html
  • 8 - NIST Cloud Reference Archiecture.html

  • 3 - Domain 2 Cloud Governance
  • 9 - Cloud Shared Responsibility Matrix
  • 10 - Policies
  • 11 - Cloud Policies and Data Residency
  • 12 - Contracting with Cloud Vendors
  • 13 - Understand ISO 27017 and Key Provisions
  • 14 - BSI C5 PCI SSC.html
  • 15 - NIST CSF.html
  • 16 - NIST SP 80053
  • 17 - CSA STAR CCM CAIQ
  • 18 - Cloud Governance.html
  • 19 - CCOE Cloud Advisory Council.html
  • 20 - Cloud Deployment Registery.html

  • 4 - Domain 3 Risk Audit Compliance
  • 21 - What is Risk Management
  • 22 - NIST Risk Management Framework
  • 23 - NIST SP 80030
  • 24 - ISO 27005 ISO 31000
  • 25 - Privacy Regulations
  • 26 - The EUUS Data Privacy Framework
  • 27 - Privacy Controls and EDiscovery

  • 5 - Domain 4 Organization Management
  • 28 - Cloud Organization Hierarchy models.html
  • 29 - CSP Policies.html
  • 30 - Cloud Security Posture Management CSPM.html
  • 31 - Cloud Workload Protection Platform CWPP.html
  • 32 - Cloud Native Application Protection Platform CNAPP.html
  • 33 - Hybrid and MultiCloud Strategies.html

  • 6 - Domain 5 Identity Access Management
  • 34 - Identity Access Management
  • 35 - Authorization Models and RBAC
  • 36 - Single signon SSO RSO MTLS
  • 37 - Key Access Control Concepts
  • 38 - Federated identity and IdP OpenID SAML Auth Protocols
  • 39 - SASE CASB

  • 7 - Domain 6 Security Monitoring
  • 40 - Threats and Vulnerabilities on Cloud
  • 41 - Security Vulnerabilities
  • 42 - Vulnerability Related Terms CVE CVSS
  • 43 - Advanced Persistent Threats
  • 44 - DOS DDOS Attacks
  • 45 - Performance Monitoring and KPI
  • 46 - Security Operation Center
  • 47 - Log Management
  • 48 - Threat Intelligence
  • 49 - Digital Risk Protection and Dark Web Monitoring

  • 8 - Domain 7 Infrastructure Networking
  • 50 - Understand Cloud Architecture Region AD
  • 51 - Understand the Multitenancy
  • 52 - Infrastructure as Code
  • 53 - API and API Gateway
  • 54 - Virtualization
  • 55 - Containers
  • 56 - Serverless Computing
  • 57 - Software Defined Network
  • 58 - Network Function Virtualization

  • 9 - Domain 8 Cloud Workload Security
  • 59 - Cloud Native Archiecture
  • 60 - Virtualization Security
  • 61 - Container Security
  • 62 - Docker Security
  • 63 - Kubernetes Security
  • 64 - Understand Security Controls
  • 65 - Best Practices in Control Selection
  • 66 - Defence in Depth Concept

  • 10 - Domain 9 Data Security
  • 67 - Cloud Data lifecycle
  • 68 - Data Storage and Retention and Archiving
  • 69 - Data dispersion in the Cloud and Data Flow
  • 70 - Data Disposal
  • 71 - Data Protection Policies Encryption and Classification
  • 72 - Data obfuscation Tokenization
  • 73 - Data loss prevention
  • 74 - Information Rights Management IRM
  • 75 - Secrets and Key Management

  • 11 - Domain 10 Application Security
  • 76 - OWASP Top 10
  • 77 - CWE Common Weak Enumeration
  • 78 - Threat Modeling
  • 79 - Secure Coding
  • 80 - Software Security Testing
  • 81 - DevOps
  • 82 - DevOps security
  • 83 - Penetration Testing
  • 84 - Bug Bounty Program

  • 12 - Domain 11 Incident Response Resilience
  • 85 - Incident management
  • 86 - Incident Response Plan
  • 87 - Forensic data collection methodologies
  • 88 - SIEM
  • 89 - BIA DRP BCP
  • 90 - RPO RTO
  • 91 - BCP Testing

  • 13 - Domain 12 Related Technologies Strategies
  • 92 - Zero Trust vs Trust but Verify
  • 93 - Artificial Intelligence and Machine Learning
  • 94 - Generative AI Overview
  • 95 - Types of AI Narrow General
  • 96 - Block Chain and raise of Quantum Computing
  • 97 - IoT and ICS
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42917
    حجم: 3643 مگابایت
    مدت زمان: 698 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید