Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Module 1: Architecture
- 1.0 Cloud Security Overview Part 1
- 1.1 Cloud Security Overview Part 2
- 1.2 Cloud Diagrams
- 1.3 Cloud Services
- Module 2: Governance and Enterprise Risk
- 2.0 Risk Management
- 2.1 Corporate Governance
- 2.2 Enterprise Risk Management
- 2.3 Risk Management Balance Process | Supply Chain Security
- 2.4 ERM Incidents | Recommendations Part 1
- 2.5 ERM Incidents | Recommendations Part 2
- 2.6 ERM Incidents | Recommendations Part 3
- Module 3: Legal Issues - Contracts and Electronic
- 3.0 Cloud Legal Issues Part 1
- 3.1 Cloud Legal Issues Part 2 - Possession, Contract Consideration
- 3.2 Cloud Legal Issues Part 3 - Native Production
- Module 4: Compliance and Audit Management
- 4.0 Audits
- 4.1 Compliance & Audit
- 4.2 Audit Recommendations
- 4.3 Audit Requirements
- Module 5: Information Management and Data Security
- 5.0 Information & Security
- 5.1 Storage
- 5.2 Information Governance | Classification
- 5.3 Data Security
- 5.4 Data Security Part 2 - Protecting Data Moving
- 5.5 Client Database Encryption
- 5.6 PaaS Encryption
- Module 6: Interoperability and Portability
- 6.0 Interoperability & Portability
- 6.1 Interoperability Recommendations
- 6.2 Portability Recommendations
- 6.3 Recommendations SaaS
- Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- 7.0 Business Conitnuity & Disaster Recovery
- 7.1 Assessing CSP Security
- 7.2 Equipment Maintenance
- 7.3 Recommendations
- Module 8: Data Center Operations
- 8.0 Data Center Operations
- Module 9: Incident Response
- 9.0 Incident Response
- 9.1 Testing
- 9.2 IaaS
- 9.3 C.E.R. = Containment, Eradication, & Recovery
- Module 10: Application Security
- 10.0 Application Security
- 10.1 Security Testing
- 10.2 Audit Compliance
- 10.3 Security Assurance Recommendations
- Module 11: Encryption and Key Management
- 11.0 Encryption & Key Management
- 11.1 Content Aware Encryption
- 11.2 Storage of Keys
- Module 12: Identity, Entitlement, and Access Management
- 12.0 Building Access Control
- 12.1 Intro to Identity
- 12.2 Entitlement Process
- 12.3 Trust with Identity
- 12.4 Recommendations for Identity Management
- Module 13: Virtualization
- 13.0 Virtualization
- 13.1 Hypervisor & Virtual Machine
- 13.2 Inter-Virtual Machine Attacks
- 13.3 Virtual Machine Encryption
- 13.4 Virtual Machine Recommendations & Requirements
- Module 14: Security as a Service
- 14.0 Security as a Service (SaaS)
- 14.1 Implementing Advantages
- 14.2 Security Offerings
- 14.3 Intrusion Detection | Prevention
- 14.4 Business Continuity & Disaster Recovery
- 14.5 European CCSK
- 14.6 Top Security Benefits
- 14.7 European Legal Based Issues
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement