Advertisement
opexxx

SA Certificate of Cloud Technology Security Knowledge (CCSK)

Dec 5th, 2018
265
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.67 KB | None | 0 0
  1. Module 1: Architecture
  2.  
  3. 1.0 Cloud Security Overview Part 1
  4.  
  5. 1.1 Cloud Security Overview Part 2
  6.  
  7. 1.2 Cloud Diagrams
  8.  
  9. 1.3 Cloud Services
  10.  
  11. Module 2: Governance and Enterprise Risk
  12.  
  13. 2.0 Risk Management
  14.  
  15. 2.1 Corporate Governance
  16.  
  17. 2.2 Enterprise Risk Management
  18.  
  19. 2.3 Risk Management Balance Process | Supply Chain Security
  20.  
  21. 2.4 ERM Incidents | Recommendations Part 1
  22.  
  23. 2.5 ERM Incidents | Recommendations Part 2
  24.  
  25. 2.6 ERM Incidents | Recommendations Part 3
  26.  
  27. Module 3: Legal Issues - Contracts and Electronic
  28.  
  29. 3.0 Cloud Legal Issues Part 1
  30.  
  31. 3.1 Cloud Legal Issues Part 2 - Possession, Contract Consideration
  32.  
  33. 3.2 Cloud Legal Issues Part 3 - Native Production
  34.  
  35. Module 4: Compliance and Audit Management
  36.  
  37. 4.0 Audits
  38.  
  39. 4.1 Compliance & Audit
  40.  
  41. 4.2 Audit Recommendations
  42.  
  43. 4.3 Audit Requirements
  44.  
  45. Module 5: Information Management and Data Security
  46.  
  47. 5.0 Information & Security
  48.  
  49. 5.1 Storage
  50.  
  51. 5.2 Information Governance | Classification
  52.  
  53. 5.3 Data Security
  54.  
  55. 5.4 Data Security Part 2 - Protecting Data Moving
  56.  
  57. 5.5 Client Database Encryption
  58.  
  59. 5.6 PaaS Encryption
  60.  
  61. Module 6: Interoperability and Portability
  62.  
  63. 6.0 Interoperability & Portability
  64.  
  65. 6.1 Interoperability Recommendations
  66.  
  67. 6.2 Portability Recommendations
  68.  
  69. 6.3 Recommendations SaaS
  70.  
  71. Module 7: Traditional Security, Business Continuity, and Disaster Recovery
  72.  
  73. 7.0 Business Conitnuity & Disaster Recovery
  74.  
  75. 7.1 Assessing CSP Security
  76.  
  77. 7.2 Equipment Maintenance
  78.  
  79. 7.3 Recommendations
  80.  
  81. Module 8: Data Center Operations
  82.  
  83. 8.0 Data Center Operations
  84.  
  85. Module 9: Incident Response
  86.  
  87. 9.0 Incident Response
  88.  
  89. 9.1 Testing
  90.  
  91. 9.2 IaaS
  92.  
  93. 9.3 C.E.R. = Containment, Eradication, & Recovery
  94.  
  95. Module 10: Application Security
  96.  
  97. 10.0 Application Security
  98.  
  99. 10.1 Security Testing
  100.  
  101. 10.2 Audit Compliance
  102.  
  103. 10.3 Security Assurance Recommendations
  104.  
  105. Module 11: Encryption and Key Management
  106.  
  107. 11.0 Encryption & Key Management
  108.  
  109. 11.1 Content Aware Encryption
  110.  
  111. 11.2 Storage of Keys
  112.  
  113. Module 12: Identity, Entitlement, and Access Management
  114.  
  115. 12.0 Building Access Control
  116.  
  117. 12.1 Intro to Identity
  118.  
  119. 12.2 Entitlement Process
  120.  
  121. 12.3 Trust with Identity
  122.  
  123. 12.4 Recommendations for Identity Management
  124.  
  125. Module 13: Virtualization
  126.  
  127. 13.0 Virtualization
  128.  
  129. 13.1 Hypervisor & Virtual Machine
  130.  
  131. 13.2 Inter-Virtual Machine Attacks
  132.  
  133. 13.3 Virtual Machine Encryption
  134.  
  135. 13.4 Virtual Machine Recommendations & Requirements
  136.  
  137. Module 14: Security as a Service
  138.  
  139. 14.0 Security as a Service (SaaS)
  140.  
  141. 14.1 Implementing Advantages
  142.  
  143. 14.2 Security Offerings
  144.  
  145. 14.3 Intrusion Detection | Prevention
  146.  
  147. 14.4 Business Continuity & Disaster Recovery
  148.  
  149. 14.5 European CCSK
  150.  
  151. 14.6 Top Security Benefits
  152.  
  153. 14.7 European Legal Based Issues
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement