Book description
NoneTable of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- ABOUT THE AUTHOR
- CONTENTS AT A GLANCE
- CONTENTS
- Introduction
- Acknowledgments
- Chapter 1 How to Obtain the CCSP and Introduction to Security
- Chapter 2 Cloud Concepts, Architecture, and Design
-
Chapter 3 Cloud Data Security
- Describe Cloud Data Concepts
- Design and Implement Cloud Data Storage Architectures
- Design and Apply Data Security Strategies
- Implement Data Discovery
- Implement Data Classification
- Relevant Jurisdictional Data Protections for Personally Identifiable Information
- Data Rights Management
- Data Retention, Deletion, and Archiving Policies
- Auditability, Traceability, and Accountability of Data Events
- Exercise
- Chapter Review
- Chapter 4 Cloud Platform and Infrastructure Security
-
Chapter 5 Cloud Application Security
- Advocate Training and Awareness for Application Security
- Describe the Secure Software Development Lifecycle (SDLC) Process
- Apply the Secure Software Development Lifecycle
- Cloud Software Assurance and Validation
- Verified Secure Software
- Cloud Application Architecture
- Identity and Access Management (IAM) Solutions
- Exercise
- Chapter Review
-
Chapter 6 Cloud Security Operations
- Support the Planning Process for the Data Center Design
- Implement and Build the Physical Infrastructure for the Cloud Environment
- Operate the Physical and Logical Infrastructure for the Cloud Environment
- Manage the Physical and Logical Infrastructure for Cloud Environment
- Implement Operational Controls and Standards
- Support Digital Forensics
- Manage Communication with Relevant Parties
- Manage Security Operations
- Exercise
- Chapter Review
-
Chapter 7 Legal, Risk, and Compliance
- Articulate Legal Requirements and Unique Risks Within the Cloud Environment
- Understand Privacy Issues
-
Understand Audit Processes, Methodologies, and Required Adaptations for a Cloud Environment
- Internal and External Audit Controls
- Impact of Audit Requirements
- Identify Assurance Challenges of Virtualization and Cloud
- Types of Audit Reports
- Restrictions of Audit Scope Statements
- Gap Analysis
- Audit Planning
- Internal Information Security Management System (ISMS)
- Internal Information Security Controls System
- Policies
- Identification and Involvement of Relevant Stakeholders
- Specialized Compliance Requirements for Highly Regulated Industries
- Impact of Distributed IT Model
- Understand Implications of Cloud to Enterprise Risk Management
- Understand Outsourcing and Cloud Contract Design
- Executive Vendor Management
- Exercise
- Chapter Review
- Appendix A Exam Review Questions
- Appendix B About the Online Content
- Glossary
- Index
Product information
- Title: CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition, 2nd Edition
- Author(s):
- Release date:
- Publisher(s): McGraw-Hill
- ISBN: None
You might also like
book
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 2nd Edition
The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security Professional …
book
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, 2nd Edition
Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables …
book
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition
Prepare for the CompTIA CySA+ certification exam with this fully updated self-study resource This highly effective …
book
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP …