-
Risk Management
After watching this video; you will be able to outline measures to mitigate risk.
-
AWS Availability Levels
After watching this video; you will be able to describe availability levels in Amazon Web Services.
-
AWS Components for High Availability
After watching this video; you will be able to describe the components of high availability in Amazon Web Services.
-
AWS Pilot Light
After watching this video; you will be able to describe the pilot light method of Disaster Recovery using Amazon Web Services.
-
Backup and Restore with AWS
After watching this video; you will be able to describe backup and restore services on Amazon Web Services.
-
Multi-Site DR Solutions
After watching this video; you will be able to describe multi-site disaster recovery solutions using Amazon Web Services.
-
Recovery Point Objective
After watching this video; you will be able to describe recovery point objective metrics for a disaster recovery system.
-
Recovery Time Objective
After watching this video; you will be able to describe recovery time objective metrics for a disaster recovery system.
-
RTO and RPO Examples
After watching this video; you will be able to calculate recovery point objective and recovery time objective metrics for a disaster recovery system.
-
Traditional DR
After watching this video; you will be able to describe a traditional; pre-cloud; disaster recovery solution with different levels of off-site duplication of data and services.
-
Warm Standby DR Solutions
After watching this video; you will be able to describe warm standby DR solutions using Amazon Web Services.
-
Asset Security
After watching this video; you will be able to describe the encryption of cloud-hosted assets.
-
Access Control – Physical and Virtual
After watching this video; you will be able to define local machine access controls; and deployment of secure KMV switches.
-
APIs
After watching this video; you will be able to outline the deployment of verified and approved APIs.
-
Application Management
After watching this video; you will be able to describe requirements and best practices for application configuration; and version management.
-
Architectural Security
After watching this video; you will be able to define Cloud Service roles; categories and services. Describe data state and data asset classification with reference to security. Outline the purpose of Common Criteria.
-
Asset Access Control
After watching this video; you will be able to define access and access control to cloud-hosted assets (data; files; and resources).
-
Asset Removal and Storage Media Sanitization
After watching this video; you will be able to outline asset and media management with respect to deletion/removal/overwrite on a cloud platform.
-
Audit Controls - Internal and External
After watching this video; you will be able to define audit operations and auditor tasks with reference to cloud computing services. Outline distributed service issues with respect to auditing.
-
Audit Reporting and Standards
After watching this video; you will be able to define audit reporting against a background of prevailing standards. Outline audit scope and audit regulation requirements with respect to highly regulated industries.
-
Audit Requirements; Scope; and Reporting
After watching this video; you will be able to describe audit requirements; scope; and reporting as they apply to cloud services.
-
Auditing
After watching this video; you will be able to define auditing techniques and responsibilities within key areas of focus; including asset access; asset status; deletions; archiving; and reporting.
-
Business Requirements
After watching this video; you will be able to describe business requirements with reference to the Service Level Agreement; GAAP guidelines; and standards.
-
Business Requirements and Risk
After watching this video; you will be able to describe and deploy DR and BC with respect to operations and business requirements.
-
Chain of Custody and Non-repudiation
After watching this video; you will be able to describe COC as it applied to data hosted on the cloud and understand how non-repudiation is handled within a cloud hosting environment.
-
Cloud - Data Life Cycle
After watching this video; you will be able to detail the security-based Data Lifecycle of Cloud-hosted assets (data; files; features).
-
Cloud - Risk Assessment
After watching this video; you will be able to define key areas of focus for risk assessment; including supplier; vendors; services; etc..
-
Cloud Application Development
After watching this video; you will be able to describe the application development life cycle with reference to cloud security.
-
Cloud Application Security Testing
After watching this video; you will be able to describe application testing with reference to cloud security. Describe SAST; DAST; and Penetrative Testing methodologies.
-
Cloud Computing Activities
After watching this video; you will be able to detail Cloud Computing Activities with reference to ISO/IEC 17789; Clause 9.
-
Cloud Computing Definitions
After watching this video; you will be able to define and describe cloud components.
-
Cloud Computing Infrastructure
After watching this video; you will be able to outline the supporting architectural components and infrastructure of cloud computing.
-
Cloud Computing Participants
After watching this video; you will be able to identify cloud system participants: consumers; providers; partners; auditors; regulators.
-
Cloud Computing Service Capabilities
After watching this video; you will be able to describe how cloud services are categorized based on supported services and capabilities.
-
Cloud Cross-cutting Aspects
After watching this video; you will be able to describe the additional operational aspects of the cloud service environment.
-
Cloud Environment BC and DR
After watching this video; you will be able to describe and deploy DR and BC with respect to the cloud environment.
-
Cloud Functional Security
After watching this video; you will be able to define and describe focus areas relating to the functional security of the cloud service – vendor lock-in; interoperability; portability; migration; etc..
-
Cloud Network Security
After watching this video; you will be able to define issues and solutions relating to cloud network structures.
-
Cloud Server Provider (CSP) Risk Management
After watching this video; you will be able to describe issues with obtaining details of a CSP's risk management data.
-
Cloud Service Certification Assessment
After watching this video; you will be able to describe methodologies for mapping cloud service requirements to service provider certification and product certifications.
-
Cloud Service Continuity
After watching this video; you will be able to describe Business Continuity and Disaster Recovery as it applies to a Cloud Service.
-
Cloud Service Investment
After watching this video; you will be able to define how a Cloud Deployment might be analysed on a cost basis.
-
Cloud Service Types (the Cloud Stack)
After watching this video; you will be able to describe the industry-defined standard categories of cloud computing.
-
Common Dangers and Potential Pitfalls
After watching this video; you will be able to describe common issues relating to the development of Cloud-based applications.
-
Communications Management
After watching this video; you will be able to describe and deploy best practice systems that guarantee essential and open contact and communications with cloud system providers; vendors; cloud system consumers and users; partners; auditors; regulators.
-
Compliance Assurance
After watching this video; you will be able to detail current legislation relating to PII and define a number of widely adopted auditing compliance frameworks and report types. Outline available auditing standards and frameworks; describe ISMS and applicable standards and guidance; and detail a number of cloud service adoption risks. Finally; outline some detail on available cloud service-related risk management frameworks..
-
Compute Service
After watching this video; you will be able to define the compute service as it applies to the cloud platform.
-
Contract and Vendor Management and Assessment
After watching this video; you will be able to describe the vendor and provider vetting process with reference to certifications; audit and event reporting; accreditations; etc.
-
Cryptography
After watching this video; you will be able to define security protocols and measures associated with application data and data packet protection.
-
Data Archiving
After watching this video; you will be able to outline principles; and how to define and manage data archiving procedures and methodologies.
-
Data Asset Security
After watching this video; you will be able to describe common storage media threats; data protection techniques and failover archtectures. The learner should describe event and perfornace data options available for the Cloud Service Consumer.
-
Data Asset Security and Associated Technologies
After watching this video; you will be able to define the various technologies associated with data asset security and protection.
-
Data Controls and Application
After watching this video; you will be able to detail data asset mapping to data controls types and outline the application of data control on PPI; against a backdrop of relevant legislation.
-
Data Deletion
After watching this video; you will be able to outline principles; and how to define and manage data deletion procedures and methodologies.
-
Data Discovery Implementation
After watching this video; you will be able to describe Data Discovery and its implementation methodologies.
-
Data Lifecycle Stages
After watching this video; you will be able to define the various life stages of cloud-hosted data assets.
-
Data Ownership and Responsibility
After watching this video; you will be able to describe issues surrounding the importance of data ownership and define interrelationships between owner and custodian regarding responsibility.
-
Data Retention Policy
After watching this video; you will be able to define Data Retention policy principles and how to develop appropriate practices.
-
Data Rights Objects and Management
After watching this video; you will be able to define Data Rights objects in terms of user access control; managing roles; role-based access options and describe the appropriate tools to implement and secure DRM.
-
DataCenter Protection – Physical
After watching this video; you will be able to design and deploy physical and environmental security mechanisms.
-
Defence
After watching this video; you will be able to define and describe threat mitigation and attack handling techniques including ACL; designing in security; and adopting security measures.
-
Defining and Categorizing PII
After watching this video; you will be able to define PII; outline the difference between contractual and regulated PII; and describe the differences between confidentiality; integrity; availability; and privacy.
-
Emerging Data Protection Technologies
After watching this video; you will be able to describe technology selection with respect to criteria and define current and developing data protection techniques.
-
Encryption of Data Assets
After watching this video; you will be able to define encryption as it applies to cloud-hosted data.
-
Event Logging – Management and Reporting
After watching this video; you will be able to define requirement for hardware event logging and reporting.
-
Event Logging; Storage; and Analysis
After watching this video; you will be able to detail event recording; analyzing event data; and aspects of storage and protection of event data. Define the cyclical nature of event handling and event dynamics such as optimization; managing and reacting to change; and minimizing false positive objects.
-
Event Sources
After watching this video; you will be able to list event sources and the associated identity.
-
Federation and Identity Provision
After watching this video; you will be able to describe Federated Identity and its deployment for cloud-hosted application authorization and access.
-
Forensic Data Collection and Management
After watching this video; you will be able to describe best practice approach to the deployment of proactive and reactive forensic data collection methods.
-
Forensic Requirement
After watching this video; you will be able to define the legislative requirement related to forensic data management.
-
Functional Testing
After watching this video; you will be able to define functional testing as it relates to cloud-based application software.
-
Gap Analysis and Planning
After watching this video; you will be able to define gap analysis and audit planning with reference to cloud service auditing.
-
Guest Operating System Installation
After watching this video; you will be able to describe the tolls associated with VM OS installation on the physical host.
-
Hardware and Virtualization Configuration
After watching this video; you will be able to describe the deployment and configuration of secured hardware with reference to storage controllers; network controllers; and virtualized environment.
-
Hardware Configuration and Security
After watching this video; you will be able to describe the deployment and configuration of secured hardware with reference to BIOS; TMP; and the host preboot environment.
-
Hardware Monitoring
After watching this video; you will be able to describe requirement to continuously monitor and report on host component performance.
-
Host Configuration – Backup and Restore
After watching this video; you will be able to describe the implementation of back and restore policy with reference to cloud components; including data; configurations; etc.
-
Host Management
After watching this video; you will be able to describe standalone and cluster host availability; backup; and failover; in addition to load balancing; dynamic optimization (DO); maintenance mode; and general high availability best practice adoption.
-
Implementation
After watching this video; you will be able to deploy DR and BC mechanisms.
-
Information Management Controls
After watching this video; you will be able to describe the Certified Cloud Security Professional (CCSP): Information Management Systems and Control #2
-
Information Management Systems and Control #1
After watching this video; you will be able to describe the Certified Cloud Security Professional (CCSP): Information Management Systems and Control #1
-
Infrastructure and Data Threats
After watching this video; you will be able to list and describe known and common threats to cloud infrastructure and data assets.
-
International Legislation Conflict
After watching this video; you will be able to describe areas of legislative conflict with respect to cloud-hosted services.
-
International Regulation variations
After watching this video; you will be able to describe the international variations that apply to PII and data privacy.
-
Isolation
After watching this video; you will be able to describe isolation and sandboxing as it applies to cloud-hosted applications.
-
Key Management
After watching this video; you will be able to describe key-pair management as it applies to cloud-hosted data.
-
Known Common Vulnerabilities
After watching this video; you will be able to define known threats and security issues that must be considered when developing cloud-hosted applications.
-
Legal Control
After watching this video; you will be able to describe how to apply control policy with respect to legal requirements.
-
Legal Risks
After watching this video; you will be able to appraise legal risks associated with the provision of cloud services.
-
Logical Aspect Design and Risk Assessment
After watching this video; you will be able to define the design and implementation of logical elements of a proposed cloud service; including tenant isolation; access control; etc.
-
Management Plane
After watching this video; you will be able to discuss Management Plane options and techniques.
-
Masking of Data
After watching this video; you will be able to describe Data Masking and masking methodologies.
-
Network and Communications Service
After watching this video; you will be able to define the networking and communication architecture of a cloud platform.
-
Network Configuration
After watching this video; you will be able to define techniques to secure network configuration and network support tools; including VLAN; TLS; DHPC and Authorized DHCP; DNS and Secure; and IPSec.
-
Network Security Management
After watching this video; you will be able to define the deployment of network security-related controls; including firewalls; IDS; IPS; honeypot deployment; and vulnerability assessment/threat mitigation.
-
Operating System – Update and Patching
After watching this video; you will be able to describe requirements and best practices with reference to fixes; patches; and updates.
-
Operating System Baseline
After watching this video; you will be able to define the preservation of OS compliance with reference to monitoring and remediation.
-
Operating System Security
After watching this video; you will be able to define operating system hardening techniques with reference to OS: Windows; Linux; Vmware; etc..
-
Operations Security
After watching this video; you will be able to detail datacenter operational design factors and define network component security control. Define four system management categories and the NIST Forensic Evidence process. Describe Cloud Service Actor .
-
Personally Identifiable Information (PII) Law
After watching this video; you will be able to list active data privacy protection legislation by jurisdiction – Data Privacy Acts/Law.
-
Physical and Environmental Design
After watching this video; you will be able to define the design and implementation of physical aspects of a proposed cloud service; including build or rent; location; management.
-
Physical and Logical Risk Management
After watching this video; you will be able to describe and implement risk management.
-
Physical Architecture
After watching this video; you will be able to recognize the physical and virtual components within a cloud platform.
-
Platform-specific Security
After watching this video; you will be able to define security consideration and responsibilities on a per cloud model (Category basis - IaaS; PaaS; and SaaS plus its various derivatives: NaaS; SeCaaS; et cetera).
-
Product Certification
After watching this video; you will be able to outline methodologies for mapping cloud components to appropriate or required industry certifications or industry standards.
-
Protecting Access – System and Data
After watching this video; you will be able to describe and manage identification; system; and data access in addition to authentication and authority within the Cloud Service.
-
Protection – Systems (Physical and Virtualized)
After watching this video; you will be able to design and deploy security mechanisms to mitigate failure and threats; and avoid attacks to the systems and communication hardware within a cloud platform.
-
Published Security Issues
After watching this video; you will be able to describe common security issues relating to Cloud-hosted applications. Define the importance of foreknowledge regarding cloud application vulnerabilities and OWASP research.
-
Regulatory Control and Standards Adoption
After watching this video; you will be able to describe and implement the various management tasks to ensure compliance and control with reference to industry standard regulations; including ITIL; ISO/EIC 20000-1.
-
Remote Access
After watching this video; you will be able to describe the mechanisms for deploying Remote Access; including RDP; Secure Terminal Access.
-
Risk
After watching this video; you will be able to describe and define risk as it applies to cloud services and underlying infrastructure; and adopt a risk analysis and management posture regarding cloud computing.
-
Risk Frameworks
After watching this video; you will be able to outline the integration of information security and risk management activities into a formal framework.
-
Risk Management Metrics
After watching this video; you will be able to outline the metrics that quantify and measure the extent of a risk associated with cloud service elements and components.
-
Risks
After watching this video; you will be able to define cloud-specific risks; and assimilate to mitigate threat within the design and during the operational phases of cloud-hosted applications.
-
Securing the Virtualized Environment
After watching this video; you will be able to define issues and solutions relating to cloud virtualization infrastructures.
-
Security Devices
After watching this video; you will be able to describe associated hardware/software components related to the security of cloud applications.
-
Sensitive Data Classification
After watching this video; you will be able to outline data classification and the classification of discovered sensitive data.
-
Single Sign-On/Off (SSO)
After watching this video; you will be able to Define Single Sign-ON/Off and its place within the Cloud service security framework.
-
Specify Application Security
After watching this video; you will be able to describe the phase of NIST’s SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference.
-
Specify infrastructural security
After watching this video; you will be able to describe Cloud Service platforms and associated risks. Discuss vulnerabilities within the virtualized infrastructure and attck vectors in general. Finally; discuss available Disaster Recover architectures.
-
Storage Service
After watching this video; you will be able to define storage and Storage as a Service (STaaS) within a cloud platform.
-
Storage Type Threat
After watching this video; you will be able to define and describe potential threats associated with storage types.
-
Storage Type Threat Mitigation
After watching this video; you will be able to define threat mitigation technology and techniques.
-
Storage Types
After watching this video; you will be able to define storage modes in a cloud computing environment; and be able to map data assets to appropriate storage mode.
-
Strategy and Planning
After watching this video; you will be able to define and describe relevant DR and BC strategies.
-
Supply-Chain & Community
After watching this video; you will be able to describe the significance of surfacing the Supply-Chain with reference to cloud-hosted application software.
-
Supply-chain Management
After watching this video; you will be able to describe the deployment of supply-chain management in the context of cloud services.
-
Threat and Attack
After watching this video; you will be able to describe and define known threats and attack vectors associated with Cloud Services and infrastructure.
-
Threat Modeling and QoS
After watching this video; you will be able to define how to analyze security threats and risks to an application.
-
Tokenization of Data
After watching this video; you will be able to describe Data Tokenization technologies.
-
Virtualization - Auditing Challenges
After watching this video; you will be able to outline challenges associated with auditing the virtualized infrastructure of a cloud-based service.
-
Virtualization Vulnerabilities
After watching this video; you will be able to define virtualization-specific areas of focus with reference to security such as hypervisor; VM files and VM deletion.
-
Virtualized Infrastructure
After watching this video; you will be able to define the available virtualization options within a cloud platform.
-
Virtualized Infrastructure Construction
After watching this video; you will be able to define the secure configuration of the virtual hardware; including network; storage and elastic expansion; memory; and external devices.
-
Architecture
After watching this video; you will be able to define the mechanics; phases; and methodologies associated with application development.
-
Cloud Deployment Models
After watching this video; you will be able to describe the defined deployment models of the cloud services.
-
Regulatory Control and Standards Adoption
After watching this video; you will be able to describe describe compliance and control principles and standards: Information Security; Service Improvement; Incident; Problem; and Release Management.
-
Business Requirements
After watching this video; you will be able to define how business requirements impact on application development and throughout the application life time.
-
Training and Awareness
After watching this video; you will be able to describe awareness and required training to develop an understanding of security focus areas relating to cloud applications.
-
Multi-Factor Authentication
After watching this video; you will be able to describe and deploy Multifactor Authentication within a cloud service security framework.
-
Regulatory Control and Standards Adoption
After watching this video; you will be able to describe compliance and control principles and standards: Configuration; Service Level; Availability and Capacity Management.
-
Cloud Computing Characteristics
After watching this video; you will be able to outline the operational characteristics of cloud computing.
-
Event Logging – Management and Reporting
After watching this video; you will be able to define requirement for hardware event logging and reporting.
-
Network Configuration
After watching this video; you will be able to define techniques to secure network configuration and network support tools; including VLAN; TLS; DHPC and Authorized DHCP; DNS and Secure; and IPSec.
-
Virtualization
After watching this video; you will be able to describe the virtualization technology associated with cloud-hosted applications.
-
Performance Monitoring
After watching this video; you will be able to describe requirement to continuously monitor and report on host component performance.
-
eDiscovery
After watching this video; you will be able to define eDiscovery and its impact on cloud service provision; requirements; and responsibilities.