Table of contents
Getting Started
3mins
Lock icon
About the Author | 1m
Lock icon
About the Course | 1m
Lock icon
Course Prerequisites | 1m
Cloud Computing Concepts
9mins
Lock icon
Roles, Characteristics and Building Block Technologies | 9m
Cloud Reference Architecture
221mins
Lock icon
Cloud Computing Activities and Service Categories | 15m
Lock icon
Cloud Deployment Models | 8m
Lock icon
Cloud Shared Considerations | 7m
Lock icon
Impact of Related Technologies | 8m
Lock icon
Lab Preparation Video (Important) | 1m
Lock icon
Access and Tour the AWS Console | 1h 0m
Lock icon
Introduction to EC2 | 1h 0m
Lock icon
Create a Windows EC2 Instance and Connect using Remote Desktop Protocol (RDP) | 1h 0m
Cloud Security Concepts
129mins
Lock icon
Cryptography and Key Management | 8m
Lock icon
Data and Media Sanitization | 3m
Lock icon
Access Control | 6m
Lock icon
Network Security and Virtualization Security | 8m
Lock icon
Common Threats | 13m
Lock icon
Introduction to AWS Identity and Access Management (IAM) | 1h 30m
Design Principles
30mins
Lock icon
Secure Cloud Data Lifecycle | 4m
Lock icon
Cloud-Based Disaster Recovery (DR) and Business Continuity (BC) | 9m
Lock icon
Cost-Benefit Analysis | 6m
Lock icon
Functional Security Requirements | 4m
Lock icon
Security Considerations for Different Cloud Categories | 5m
Evaluate Cloud Service Providers
18mins
Lock icon
Verification Against Criteria | 13m
Lock icon
System and Subsystem Product Certifications | 5m
Describe Cloud Data Concepts
11mins
Lock icon
Cloud Data Lifecycle Phases | 6m
Lock icon
Data Dispersion | 4m
Design and Implement Cloud Data Storage Architecture
57mins
Lock icon
Storage Types | 4m
Lock icon
Threats to Storage Types | 7m
Lock icon
Creating Amazon S3 Buckets, Managing Objects, and Enabling Versioning | 45m
Design and Apply Data Security Technologies and Strategies
34mins
Lock icon
Encryption and Key Management | 13m
Lock icon
Hashing, Masking, and Obfuscation | 5m
Lock icon
Tokenization | 4m
Lock icon
Data Loss Prevention (DLP) | 8m
Lock icon
Data De-identification | 3m
Implement Data Discovery and Classification
9mins
Lock icon
Structured and Unstructured Data | 5m
Lock icon
Mapping, Labeling, and Sensitive Data | 3m
Design and Implement Information Rights Management
8mins
Lock icon
IRM Objectives and Tools | 8m
Plan and Implement Data Retention, Deletion, and Archival Policies
62mins
Lock icon
Data Retention Policies | 5m
Lock icon
Data Deletion Procedures and Mechanisms | 3m
Lock icon
Data Archival Procedures and Mechanisms | 6m
Lock icon
Legal Hold | 2m
Lock icon
Creating a Basic Amazon S3 Lifecycle Policy | 45m
Design and Implement Auditability, Traceability, and Accountability of Data Events
19mins
Lock icon
Definition of Event Sources and Requirements | 8m
Lock icon
Logging, Storage, and Analysis of Data Events | 6m
Lock icon
Chain of Custody and Non-Repudiation | 4m
Cloud Infrastructure Components
30mins
Lock icon
Physical Environment | 7m
Lock icon
Network and Communications | 5m
Lock icon
Compute and Virtualization | 9m
Lock icon
Storage and Management Plane | 7m
Design a Secure Datacenter
33mins
Lock icon
Logical Design | 10m
Lock icon
Physical Design | 9m
Lock icon
Environmental Design | 14m
Analyze Risks Associated with Cloud Infrastructure
19mins
Lock icon
Risk Assessment and Analysis | 8m
Lock icon
Cloud Vulnerabilities, Risks, Threats, and Attacks | 6m
Lock icon
Countermeasure Strategies | 5m
Design and Plan Security Controls
20mins
Lock icon
Physical and Environmental Protection | 3m
Lock icon
System and Communication Protection | 6m
Lock icon
Identification, Authentication, and Authorization in Cloud Infrastructure | 4m
Lock icon
Audit Mechanisms | 5m
Plan Disaster Recovery (DR) and Business Continuity (BC)
45mins
Lock icon
Risks Related to the Cloud Environment | 7m
Lock icon
Business Requirements | 6m
Lock icon
Business Continuity/Disaster Recovery Strategy | 5m
Lock icon
Creating a BCDR Plan | 14m
Lock icon
Testing a BCDR Plan | 11m
Advocate Training and Awareness for Application Security
7mins
Lock icon
Cloud Development Basics | 3m
Lock icon
Common Pitfalls and Vulnerabilities | 3m
Describe the Secure Software Development Life Cycle (SDLC) Process
11mins
Lock icon
Business Requirements and Phases/Methodologies | 11m
Apply the Secure Software Development Life Cycle (SDLC)
16mins
Lock icon
Avoid Common Vulnerabilities During Development | 6m
Lock icon
Cloud-Specific Risks and Quality Assurance | 5m
Lock icon
Threat Modeling and Configuration Management | 5m
Apply Cloud Software Assurance and Validation
7mins
Lock icon
Functional Testing and Security Testing Methodologies | 7m
Use Verified Secure Software
4mins
Lock icon
Approved APIs and Third-Party Software | 4m
Comprehend the Specifics of Cloud Application Architecture
74mins
Lock icon
Supplemental Security Components | 3m
Lock icon
Cryptography | 6m
Lock icon
Sandboxing and Application Virtualization | 3m
Lock icon
AWS Security Essentials - KMS Integration with S3 | 1h 0m
Design Appropriate Identity and Access Management (IAM) Solutions
12mins
Lock icon
Federated Identity and Identity Providers | 3m
Lock icon
Single Sign-On (SSO) and Multi-Factor Authentication (MFA) | 5m
Lock icon
Cloud Access Security Broker (CASB) | 3m
Implement and Build Physical and Logical Infrastructure for a Cloud Environment
8mins
Lock icon
Hardware-Specific Security Configuration Requirements | 3m
Lock icon
Virtualization Management Toolsets | 5m
Operate Physical and Logical Infrastructure for the Cloud Environment
32mins
Lock icon
Configure Access Control for Local and Remote Access | 6m
Lock icon
Secure Network Configuration | 9m
Lock icon
Operating System (OS) Hardening through the Application of Baselines | 3m
Lock icon
Stand-Alone Hosts | 3m
Lock icon
Availability of Clustered Hosts and Guest OSs | 8m
Manage Physical and Logical Infrastructure for the Cloud Environment
32mins
Lock icon
Access Controls for Remote Access | 4m
Lock icon
Patch Management | 11m
Lock icon
Performance, Capacity, and Hardware Monitoring | 4m
Lock icon
Backup and Restore Functions | 4m
Lock icon
Network Security Controls and Management Plane | 7m
Implement Operational Controls and Standards
19mins
Lock icon
Change and Continuity Management | 6m
Lock icon
Information Security and Incident Management | 3m
Lock icon
Problem and Deployment Management | 3m
Lock icon
Additional Operational Management | 6m
Support Digital Forensics
14mins
Lock icon
Forensic Data Collection Methodologies | 12m
Lock icon
Evidence Management | 2m
Manage Communication with Relevant Parties
6mins
Lock icon
Managing Communications | 6m
Manage Security Operations
13mins
Lock icon
Security Operations Center (SOC) and Monitoring Security Controls | 3m
Lock icon
Log Capture and Analysis | 3m
Lock icon
Incident Management | 5m
Articulate Legal Requirements and Unique Risks with the Cloud Environment
25mins
Lock icon
Conflicting International Legislation | 4m
Lock icon
Legal Risks Specific to Cloud Computing | 1m
Lock icon
Legal Frameworks and Guidelines | 13m
Lock icon
eDiscovery | 3m
Lock icon
Forensics Requirements | 2m
Understand Privacy Issues
18mins
Lock icon
Contractual vs. Regulated Private Data | 5m
Lock icon
Country-Specific Legislation Related to Private Data | 8m
Lock icon
Jurisdictional Differences and Standard Privacy Requirements | 4m
Understand Audit Processes, Methodologies, and Required Adaptations for a Cloud Environment
40mins
Lock icon
Audit Controls and Requirements | 5m
Lock icon
Assurance Challenges of Virtualization and Cloud | 3m
Lock icon
Types of Audit Reports | 5m
Lock icon
Restrictions of Audit Scope Statements | 4m
Lock icon
Gap Analysis and Audit Planning | 5m
Lock icon
Internal Security Management System (ISMS) | 3m
Lock icon
Policies and Involvement of Relevant Stakeholders | 7m
Lock icon
Specialized Compliance Requirements for Highly Regulated Industries | 2m
Lock icon
Impact of Distributed Information Technology (IT) Model | 3m
Understand the Implications of Cloud-to-Enterprise Risk Management
24mins
Lock icon
Assess Providers' Risk Management Programs | 5m
Lock icon
Data Owner/Controller vs. Data Custodian/Processor | 2m
Lock icon
Regulatory Transparency Requirements | 2m
Lock icon
Risk Treatment and Frameworks | 6m
Lock icon
Metrics for Risk Management | 4m
Lock icon
Assessment of Risk Environment | 3m
Understand Outsourcing and Cloud Contract Design
16mins
Lock icon
Business Requirements | 3m
Lock icon
Vendor Management | 5m
Lock icon
Contract Management | 3m
Lock icon
Supply Chain Management | 3m
Next Steps
4mins
Lock icon
How to Prepare for the Exam | 3m
Lock icon
What's Next After Certification | 1m
Lock icon
| 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon