3.56 GB | 00:19:05 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 - CCSK Course Introduction (22.37 MB)
2 - How to get the most out of this course (46.55 MB)
3 - About Trainer (12.79 MB)
67 - Cloud Data lifecycle (11.45 MB)
68 - Data Storage and Retention and Archiving (21.78 MB)
69 - Data dispersion in the Cloud and Data Flow (25.09 MB)
70 - Data Disposal (35.9 MB)
71 - Data Protection Policies Encryption and Classification (71.29 MB)
72 - Data obfuscation Tokenization (39.57 MB)
73 - Data loss prevention (34.96 MB)
74 - Information Rights Management IRM (30.81 MB)
75 - Secrets and Key Management (43.61 MB)
76 - OWASP Top 10 (36.17 MB)
77 - CWE Common Weak Enumeration (22 MB)
78 - Threat Modeling (43.07 MB)
79 - Secure Coding (61.4 MB)
80 - Software Security Testing (38.5 MB)
81 - DevOps (50.58 MB)
82 - DevOps security (37.27 MB)
83 - Penetration Testing (46.08 MB)
84 - Bug Bounty Program (19.1 MB)
85 - Incident management (27.03 MB)
86 - Incident Response Plan (42 MB)
87 - Forensic data collection methodologies (76.55 MB)
88 - SIEM (45.76 MB)
89 - BIA DRP BCP (56.08 MB)
90 - RPO RTO (42.23 MB)
91 - BCP Testing (18.25 MB)
92 - Zero Trust vs Trust but Verify (16.38 MB)
93 - Artificial Intelligence and Machine Learning (52.38 MB)
94 - Generative AI Overview (38.32 MB)
95 - Types of AI Narrow General (23.68 MB)
96 - Block Chain and raise of Quantum Computing (52.04 MB)
97 - IoT and ICS (145.91 MB)
4 - Introduction to Cloud Computing (39.59 MB)
5 - Cloud Deployment Models (21.81 MB)
6 - Cloud Service Models (39.8 MB)
10 - Policies (17.22 MB)
11 - Cloud Policies and Data Residency (37.49 MB)
12 - Contracting with Cloud Vendors (39.48 MB)
13 - Understand ISO 27017 and Key Provisions (40.15 MB)
16 - NIST SP 80053 (44.75 MB)
17 - CSA STAR CCM CAIQ (71.92 MB)
9 - Cloud Shared Responsibility Matrix (32.86 MB)
21 - What is Risk Management (35.39 MB)
22 - NIST Risk Management Framework (36.78 MB)
23 - NIST SP 80030 (33.37 MB)
24 - ISO 27005 ISO 31000 (61.58 MB)
25 - Privacy Regulations (69.81 MB)
26 - The EUUS Data Privacy Framework (46.33 MB)
27 - Privacy Controls and EDiscovery (83.58 MB)
34 - Identity Access Management (44.54 MB)
35 - Authorization Models and RBAC (105.27 MB)
36 - Single signon SSO RSO MTLS (28.4 MB)
37 - Key Access Control Concepts (29.15 MB)
38 - Federated identity and IdP OpenID SAML Auth Protocols (16.3 MB)
39 - SASE CASB (43.1 MB)
40 - Threats and Vulnerabilities on Cloud (35.19 MB)
41 - Security Vulnerabilities (48.72 MB)
42 - Vulnerability Related Terms CVE CVSS (27.28 MB)
43 - Advanced Persistent Threats (43.18 MB)
44 - DOS DDOS Attacks (47.66 MB)
45 - Performance Monitoring and KPI (27.8 MB)
46 - Security Operation Center (26.49 MB)
47 - Log Management (38.09 MB)
48 - Threat Intelligence (18.27 MB)
49 - Digital Risk Protection and Dark Web Monitoring (23.07 MB)
50 - Understand Cloud Architecture Region AD (72.27 MB)
51 - Understand the Multitenancy (41.29 MB)
52 - Infrastructure as Code (34.23 MB)
53 - API and API Gateway (56.37 MB)
54 - Virtualization (46.6 MB)
55 - Containers (49.13 MB)
56 - Serverless Computing (91.5 MB)
57 - Software Defined Network (45.01 MB)
58 - Network Function Virtualization (99.37 MB)
59 - Cloud Native Archiecture (59.31 MB)
60 - Virtualization Security (42.55 MB)
61 - Container Security (22.02 MB)
62 - Docker Security (62.51 MB)
63 - Kubernetes Security (74.88 MB)
64 - Understand Security Controls (56.85 MB)
65 - Best Practices in Control Selection (17.47 MB)
66 - Defence in Depth Concept (29.65 MB)
2 - How to get the most out of this course (46.55 MB)
3 - About Trainer (12.79 MB)
67 - Cloud Data lifecycle (11.45 MB)
68 - Data Storage and Retention and Archiving (21.78 MB)
69 - Data dispersion in the Cloud and Data Flow (25.09 MB)
70 - Data Disposal (35.9 MB)
71 - Data Protection Policies Encryption and Classification (71.29 MB)
72 - Data obfuscation Tokenization (39.57 MB)
73 - Data loss prevention (34.96 MB)
74 - Information Rights Management IRM (30.81 MB)
75 - Secrets and Key Management (43.61 MB)
76 - OWASP Top 10 (36.17 MB)
77 - CWE Common Weak Enumeration (22 MB)
78 - Threat Modeling (43.07 MB)
79 - Secure Coding (61.4 MB)
80 - Software Security Testing (38.5 MB)
81 - DevOps (50.58 MB)
82 - DevOps security (37.27 MB)
83 - Penetration Testing (46.08 MB)
84 - Bug Bounty Program (19.1 MB)
85 - Incident management (27.03 MB)
86 - Incident Response Plan (42 MB)
87 - Forensic data collection methodologies (76.55 MB)
88 - SIEM (45.76 MB)
89 - BIA DRP BCP (56.08 MB)
90 - RPO RTO (42.23 MB)
91 - BCP Testing (18.25 MB)
92 - Zero Trust vs Trust but Verify (16.38 MB)
93 - Artificial Intelligence and Machine Learning (52.38 MB)
94 - Generative AI Overview (38.32 MB)
95 - Types of AI Narrow General (23.68 MB)
96 - Block Chain and raise of Quantum Computing (52.04 MB)
97 - IoT and ICS (145.91 MB)
4 - Introduction to Cloud Computing (39.59 MB)
5 - Cloud Deployment Models (21.81 MB)
6 - Cloud Service Models (39.8 MB)
10 - Policies (17.22 MB)
11 - Cloud Policies and Data Residency (37.49 MB)
12 - Contracting with Cloud Vendors (39.48 MB)
13 - Understand ISO 27017 and Key Provisions (40.15 MB)
16 - NIST SP 80053 (44.75 MB)
17 - CSA STAR CCM CAIQ (71.92 MB)
9 - Cloud Shared Responsibility Matrix (32.86 MB)
21 - What is Risk Management (35.39 MB)
22 - NIST Risk Management Framework (36.78 MB)
23 - NIST SP 80030 (33.37 MB)
24 - ISO 27005 ISO 31000 (61.58 MB)
25 - Privacy Regulations (69.81 MB)
26 - The EUUS Data Privacy Framework (46.33 MB)
27 - Privacy Controls and EDiscovery (83.58 MB)
34 - Identity Access Management (44.54 MB)
35 - Authorization Models and RBAC (105.27 MB)
36 - Single signon SSO RSO MTLS (28.4 MB)
37 - Key Access Control Concepts (29.15 MB)
38 - Federated identity and IdP OpenID SAML Auth Protocols (16.3 MB)
39 - SASE CASB (43.1 MB)
40 - Threats and Vulnerabilities on Cloud (35.19 MB)
41 - Security Vulnerabilities (48.72 MB)
42 - Vulnerability Related Terms CVE CVSS (27.28 MB)
43 - Advanced Persistent Threats (43.18 MB)
44 - DOS DDOS Attacks (47.66 MB)
45 - Performance Monitoring and KPI (27.8 MB)
46 - Security Operation Center (26.49 MB)
47 - Log Management (38.09 MB)
48 - Threat Intelligence (18.27 MB)
49 - Digital Risk Protection and Dark Web Monitoring (23.07 MB)
50 - Understand Cloud Architecture Region AD (72.27 MB)
51 - Understand the Multitenancy (41.29 MB)
52 - Infrastructure as Code (34.23 MB)
53 - API and API Gateway (56.37 MB)
54 - Virtualization (46.6 MB)
55 - Containers (49.13 MB)
56 - Serverless Computing (91.5 MB)
57 - Software Defined Network (45.01 MB)
58 - Network Function Virtualization (99.37 MB)
59 - Cloud Native Archiecture (59.31 MB)
60 - Virtualization Security (42.55 MB)
61 - Container Security (22.02 MB)
62 - Docker Security (62.51 MB)
63 - Kubernetes Security (74.88 MB)
64 - Understand Security Controls (56.85 MB)
65 - Best Practices in Control Selection (17.47 MB)
66 - Defence in Depth Concept (29.65 MB)
Screenshot
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!