Algemene omschrijving
This self-study package from Mile2 contains: Course video, e-book, e-prep Guide, E-lab Guide, Exam Simulator, 1 week Cyberrange, 1 Year Courseware Access and 1 Year Exam Voucher.
The Cloud is being widely adopted today for a diverse set of reasons. However, many are finding that security in the cloud is a huge challenge - either because of implementation or governance. Yes, governance of security, related to your cloud vendor is a huge challenge. However, many global standards have been developed that provide a great baseline for cloud security along with governance.
Doelgroep
- Virtualization Administrators.
- Cloud Administrators.
- CIO.
- Virtualization and Cloud Auditors.
- Virtualization and Cloud Compliance Officers.
- Anyone that needs a general understanding of security in the Cloud.
- Those seeking the CCSP Certification.
Leerdoelen
- To fully understand Cloud Security from a real-world viewpoint
- To receive the hands-on experience needed to implement
Cloud Security with practical implementations - To comprehend the industry security standards for both exam knowledge and implementation
- To have a general working knowledge of what to audit in a cloud architecture.
- To know hands-on methods of auditing a cloud environment from the best practices viewpoint.
- To understand how compliance is viewed and dealt with in the cloud.
- To gain the knowledge needed to pass the exam.
Upon completion, the Certified Cloud Security Officer candidate will be able to competently take the CCSO exam.
Voorkennis
- Recommended minimum one-year experience with virtualization technology or equivalent knowledge.
- General understanding of cloud architectures.
- Minimum one-year experience with general security.
Onderwerpen
- Module 1 - Introduction to Cloud Computing and Architecture
- Module 2 - Cloud Risks
- Module 3 - ERM and Governance
- Module 4 - Legal Issues
- Module 5 - Virtualization
- Module 6 - Data Security
- Module 7 - Data Center Operations
- Module 8 - Interoperability and Portability
- Module 9 - Traditional Security
- Module 10 - BCM and DR
- Module 11 - Incident Response
- Module 12 - Application Security
- Module 13 - Encryption and Key Management
- Module 14 - Identity, Entitlement and Access Management
- Module 15 - Auditing and Compliance