CCSP for Dummies Book + 2 Practice Tests + 100 Flashcards Online

Get CCSP certified and elevate your career into the world of cloud security CCSP For Dummies is a valuable resource for anyone seeking to gain their Certified Cloud Security Professional (CCSP) certification and advance their cloud security career. This book offers a thorough review of subject knowl...

Descripción completa

Detalles Bibliográficos
Otros Autores: Deane, Arthur J., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, NJ : John Wiley & Sons, Inc [2024]
Edición:Second edition
Colección:--For dummies.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811322306719
Tabla de Contenidos:
  • Intro
  • Title Page
  • Copyright Page
  • Table of Contents
  • Introduction
  • About this Book
  • Foolish Assumptions
  • Icons Used in This Book
  • Beyond the Book
  • Where to Go from Here
  • Part 1 Starting Your CCSP Journey
  • Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification
  • Appreciating (ISC)2 and the CCSP Certification
  • Knowing Why You Need to Get Certified
  • Studying the Prerequisites for the CCSP
  • Understanding the CCSP Domains
  • Domain 1: Cloud Concepts, Architecture, and Design
  • Domain 2: Cloud Data Security
  • Domain 3: Cloud Platform and Infrastructure Security
  • Domain 4: Cloud Application Security
  • Domain 5: Cloud Security Operations
  • Domain 6: Legal, Risk, and Compliance
  • Preparing for the Exam
  • Studying on your own
  • Learning by doing
  • Getting official (ISC)2 CCSP training
  • Attending other training courses
  • Practice, practice, practice
  • Ensuring you're ready for the exam
  • Registering for the Exam
  • Taking the Exam
  • Identifying What to Do After the Exam
  • Chapter 2 Identifying Information Security Fundamentals
  • Exploring the Pillars of Information Security
  • Confidentiality
  • Integrity
  • Availability
  • Security controls
  • Threats, Vulnerabilities, and Risks . . . Oh My!
  • Threats
  • Vulnerabilities
  • Risks
  • Understanding Identity and Access Management (IAM)
  • Deciphering Cryptography
  • Encryption and decryption
  • Types of encryption
  • Common uses of encryption
  • Data protection
  • Authentication and authorization
  • Network security
  • Digital signatures
  • Virtual private networks (VPNs)
  • Crypto-shredding
  • Grasping Physical Security
  • Realizing the Importance of Business Continuity and Disaster Recovery
  • Understanding Logging and Monitoring
  • Implementing Incident Handling
  • Preparing for incidents
  • Detecting incidents
  • Containing incidents.
  • Eradicating incidents
  • Recovering from incidents
  • Conducting a post-mortem
  • Utilizing Defense-in-Depth
  • Part 2 Exploring the CCSP Certification Domains
  • Chapter 3 Domain 1: Cloud Concepts, Architecture, and Design, Part 1
  • Understanding Cloud Computing Concepts
  • Defining cloud computing terms
  • Identifying cloud computing roles and responsibilities
  • Recognizing key cloud computing characteristics
  • On-demand self-service
  • Broad network access
  • Resource pooling
  • Rapid elasticity
  • Measured service
  • Building block technologies
  • Storage
  • Networking
  • Virtualization
  • Orchestration
  • Describing Cloud Reference Architecture
  • Cloud computing activities
  • Cloud service provider
  • Cloud service customer
  • Cloud service partner
  • Cloud service capabilities
  • Cloud service categories
  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)
  • Function as a service (FaaS)
  • Software as a service (SaaS)
  • Cloud deployment models
  • Public cloud deployment
  • Private cloud deployment
  • Community cloud deployment
  • Hybrid cloud deployment
  • Cloud shared considerations
  • Interoperability
  • Portability and reversibility
  • Availability
  • Resiliency
  • Security and privacy
  • Governance
  • Service-level agreements
  • Maintenance and versioning
  • Regulatory compliance
  • Auditability
  • Impact of related technologies
  • Artificial Intelligence (AI) and machine learning (ML)
  • Data science
  • Blockchain
  • Internet of things (IoT)
  • Edge computing
  • Confidential computing
  • Containers
  • Quantum computing
  • DevSecOps
  • Chapter 4 Domain 1: Cloud Concepts, Architecture, and Design, Part 2
  • Identifying Security Concepts Relevant to Cloud Computing
  • Cryptography and key management
  • Data at rest
  • Data in transit
  • Data in use
  • Key management
  • Identity and access control.
  • Account provisioning and deprovisioning
  • Directory services
  • Privileged access management
  • Data and media sanitization
  • Network security
  • Zero trust networking
  • Virtualization security
  • Common threats
  • Insufficient identity, credential, access, and key management
  • Insecure interfaces and APIs
  • Misconfiguration and inadequate change control
  • Lack of cloud security architecture and strategy
  • Insecure software development
  • Unsecure third-party resources
  • System vulnerabilities
  • Accidental cloud data disclosure
  • Misconfiguration and exploitation of serverless and container workloads
  • Organized crime/hackers/APT
  • Cloud storage data exfiltration
  • Security hygiene
  • Baselining
  • Patching
  • Comprehending Design Principles of Secure Cloud Computing
  • Cloud secure data lifecycle
  • Cloud based business continuity (BC) and disaster recovery (DR) planning
  • Cost benefit analysis
  • Functional security requirements
  • Security considerations for different cloud categories
  • IaaS security concerns
  • PaaS security concerns
  • SaaS security concerns
  • Evaluating Cloud Service Providers
  • Verifying against certification criteria
  • ISO/IEC 27001
  • ISO/IEC 27002
  • ISO/IEC 27017 and ISO/IEC 27018
  • SOC 1, SOC 2, and SOC 3
  • Payment Card Industry Data Security Standard (PCI DSS)
  • NIST SP 800-53 and FedRAMP
  • Meeting system/subsystem product certifications
  • Common Criteria
  • FIPS 140-2 and FIPS 140-3
  • Chapter 5 Domain 2: Cloud Data Security, Part 1
  • Describing Cloud Data Concepts
  • Cloud data lifecycle phases
  • Create
  • Store
  • Use
  • Share
  • Archive
  • Destroy
  • Data dispersion
  • Data flows
  • Designing and Implementing Cloud Data Storage Architectures
  • Storage types
  • IaaS
  • PaaS
  • SaaS
  • Threats to storage types
  • Designing and Applying Data Security Technologies and Strategies.
  • Encryption and key management
  • Tokenization
  • Hashing
  • Data loss prevention (DLP)
  • Data de-identification
  • Masking
  • Implementing Data Discovery
  • Structured data
  • Unstructured data
  • Semi-structured data
  • Data location
  • Chapter 6 Domain 2: Cloud Data Security, Part 2
  • Planning and Implementing Data Classification
  • Data classification policies
  • Data mapping
  • Data labeling
  • Sensitive data
  • Personally Identifiable Information (PII)
  • Protected health information (PHI)
  • Cardholder data
  • Designing and Implementing Information Rights Management (IRM)
  • Objectives
  • Appropriate tools
  • Planning and Implementing Data Retention, Deletion, and Archiving Policies
  • Data retention policies
  • Data deletion procedures and mechanisms
  • Data archiving procedures and mechanisms
  • Legal hold
  • Designing and Implementing Auditability, Traceability, and Accountability of Data Events
  • Defining event sources and requirements of identity attribution
  • SaaS event sources
  • PaaS event sources
  • IaaS event sources
  • Identity attribution
  • Logging, storing, and analyzing data events
  • Collection
  • Verification
  • Storage and analysis
  • Chain of custody and nonrepudiation
  • Chapter 7 Domain 3: Cloud Platform and Infrastructure Security, Part 1
  • Comprehending Cloud Infrastructure and Platform Components
  • Physical environment
  • Network and communications
  • Compute
  • VMs
  • Containers
  • Reservations, limits, and shares
  • Virtualization
  • Storage
  • Volume storage
  • Object storage
  • Management plane
  • Designing a Secure Data Center
  • Logical design
  • Physical design
  • Location, location, location!
  • Buildings and structures
  • Physical security monitoring
  • Physical testing and auditing
  • Environmental design
  • Designing for resilience
  • Analyzing Risks Associated with Cloud Infrastructure and Platforms.
  • Risk assessment and analysis
  • Organizational risks
  • Compliance and legal risks
  • Cloud vulnerabilities, threats, and attacks
  • Management plane compromise
  • Incomplete data deletion and sanitization
  • Insecure multitenancy
  • Resource exhaustion
  • Network, host, and application vulnerabilities
  • Virtualization risks
  • Architectural risks
  • Hypervisor software risks
  • Configuration risks
  • Risk mitigation strategies
  • Chapter 8 Domain 3: Cloud Platform and Infrastructure Security, Part 2
  • Planning and Implementing Security Controls
  • Physical and environmental protection
  • System, storage, and communication protection
  • Virtualization systems protection
  • Vulnerability and configuration management
  • Access management
  • Network management
  • Identification, authentication, and authorization in cloud infrastructure
  • Identification
  • Authentication
  • Authorization
  • Audit mechanisms
  • Log collection
  • Packet capture
  • Planning Business Continuity (BC) and Disaster Recovery (DR)
  • Business continuity and disaster recovery strategy
  • Risks to traditional IT
  • Risks to cloud-based BCDR
  • Business requirements
  • Creating, implementing, and testing BC and DR plans
  • Scoping and assessment
  • Creating, implementing, and testing your plan
  • Chapter 9 Domain 4: Cloud Application Security, Part 1
  • Advocating Training and Awareness for Application Security
  • Cloud development basics
  • Common pitfalls
  • Migration and portability issues
  • Integration issues
  • Cloud environment challenges
  • Insufficient documentation
  • Common cloud vulnerabilities
  • Access control vulnerabilities
  • Internet-related vulnerabilities
  • Data storage vulnerabilities
  • Misuse vulnerabilities
  • Describing the Secure Software Development Lifecycle (SDLC) Process
  • Business requirements
  • Phases
  • Planning
  • Defining
  • Designing.
  • Developing.