CCSP for Dummies Book + 2 Practice Tests + 100 Flashcards Online
Get CCSP certified and elevate your career into the world of cloud security CCSP For Dummies is a valuable resource for anyone seeking to gain their Certified Cloud Security Professional (CCSP) certification and advance their cloud security career. This book offers a thorough review of subject knowl...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
John Wiley & Sons, Inc
[2024]
|
Edición: | Second edition |
Colección: | --For dummies.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811322306719 |
Tabla de Contenidos:
- Intro
- Title Page
- Copyright Page
- Table of Contents
- Introduction
- About this Book
- Foolish Assumptions
- Icons Used in This Book
- Beyond the Book
- Where to Go from Here
- Part 1 Starting Your CCSP Journey
- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification
- Appreciating (ISC)2 and the CCSP Certification
- Knowing Why You Need to Get Certified
- Studying the Prerequisites for the CCSP
- Understanding the CCSP Domains
- Domain 1: Cloud Concepts, Architecture, and Design
- Domain 2: Cloud Data Security
- Domain 3: Cloud Platform and Infrastructure Security
- Domain 4: Cloud Application Security
- Domain 5: Cloud Security Operations
- Domain 6: Legal, Risk, and Compliance
- Preparing for the Exam
- Studying on your own
- Learning by doing
- Getting official (ISC)2 CCSP training
- Attending other training courses
- Practice, practice, practice
- Ensuring you're ready for the exam
- Registering for the Exam
- Taking the Exam
- Identifying What to Do After the Exam
- Chapter 2 Identifying Information Security Fundamentals
- Exploring the Pillars of Information Security
- Confidentiality
- Integrity
- Availability
- Security controls
- Threats, Vulnerabilities, and Risks . . . Oh My!
- Threats
- Vulnerabilities
- Risks
- Understanding Identity and Access Management (IAM)
- Deciphering Cryptography
- Encryption and decryption
- Types of encryption
- Common uses of encryption
- Data protection
- Authentication and authorization
- Network security
- Digital signatures
- Virtual private networks (VPNs)
- Crypto-shredding
- Grasping Physical Security
- Realizing the Importance of Business Continuity and Disaster Recovery
- Understanding Logging and Monitoring
- Implementing Incident Handling
- Preparing for incidents
- Detecting incidents
- Containing incidents.
- Eradicating incidents
- Recovering from incidents
- Conducting a post-mortem
- Utilizing Defense-in-Depth
- Part 2 Exploring the CCSP Certification Domains
- Chapter 3 Domain 1: Cloud Concepts, Architecture, and Design, Part 1
- Understanding Cloud Computing Concepts
- Defining cloud computing terms
- Identifying cloud computing roles and responsibilities
- Recognizing key cloud computing characteristics
- On-demand self-service
- Broad network access
- Resource pooling
- Rapid elasticity
- Measured service
- Building block technologies
- Storage
- Networking
- Virtualization
- Orchestration
- Describing Cloud Reference Architecture
- Cloud computing activities
- Cloud service provider
- Cloud service customer
- Cloud service partner
- Cloud service capabilities
- Cloud service categories
- Infrastructure as a service (IaaS)
- Platform as a service (PaaS)
- Function as a service (FaaS)
- Software as a service (SaaS)
- Cloud deployment models
- Public cloud deployment
- Private cloud deployment
- Community cloud deployment
- Hybrid cloud deployment
- Cloud shared considerations
- Interoperability
- Portability and reversibility
- Availability
- Resiliency
- Security and privacy
- Governance
- Service-level agreements
- Maintenance and versioning
- Regulatory compliance
- Auditability
- Impact of related technologies
- Artificial Intelligence (AI) and machine learning (ML)
- Data science
- Blockchain
- Internet of things (IoT)
- Edge computing
- Confidential computing
- Containers
- Quantum computing
- DevSecOps
- Chapter 4 Domain 1: Cloud Concepts, Architecture, and Design, Part 2
- Identifying Security Concepts Relevant to Cloud Computing
- Cryptography and key management
- Data at rest
- Data in transit
- Data in use
- Key management
- Identity and access control.
- Account provisioning and deprovisioning
- Directory services
- Privileged access management
- Data and media sanitization
- Network security
- Zero trust networking
- Virtualization security
- Common threats
- Insufficient identity, credential, access, and key management
- Insecure interfaces and APIs
- Misconfiguration and inadequate change control
- Lack of cloud security architecture and strategy
- Insecure software development
- Unsecure third-party resources
- System vulnerabilities
- Accidental cloud data disclosure
- Misconfiguration and exploitation of serverless and container workloads
- Organized crime/hackers/APT
- Cloud storage data exfiltration
- Security hygiene
- Baselining
- Patching
- Comprehending Design Principles of Secure Cloud Computing
- Cloud secure data lifecycle
- Cloud based business continuity (BC) and disaster recovery (DR) planning
- Cost benefit analysis
- Functional security requirements
- Security considerations for different cloud categories
- IaaS security concerns
- PaaS security concerns
- SaaS security concerns
- Evaluating Cloud Service Providers
- Verifying against certification criteria
- ISO/IEC 27001
- ISO/IEC 27002
- ISO/IEC 27017 and ISO/IEC 27018
- SOC 1, SOC 2, and SOC 3
- Payment Card Industry Data Security Standard (PCI DSS)
- NIST SP 800-53 and FedRAMP
- Meeting system/subsystem product certifications
- Common Criteria
- FIPS 140-2 and FIPS 140-3
- Chapter 5 Domain 2: Cloud Data Security, Part 1
- Describing Cloud Data Concepts
- Cloud data lifecycle phases
- Create
- Store
- Use
- Share
- Archive
- Destroy
- Data dispersion
- Data flows
- Designing and Implementing Cloud Data Storage Architectures
- Storage types
- IaaS
- PaaS
- SaaS
- Threats to storage types
- Designing and Applying Data Security Technologies and Strategies.
- Encryption and key management
- Tokenization
- Hashing
- Data loss prevention (DLP)
- Data de-identification
- Masking
- Implementing Data Discovery
- Structured data
- Unstructured data
- Semi-structured data
- Data location
- Chapter 6 Domain 2: Cloud Data Security, Part 2
- Planning and Implementing Data Classification
- Data classification policies
- Data mapping
- Data labeling
- Sensitive data
- Personally Identifiable Information (PII)
- Protected health information (PHI)
- Cardholder data
- Designing and Implementing Information Rights Management (IRM)
- Objectives
- Appropriate tools
- Planning and Implementing Data Retention, Deletion, and Archiving Policies
- Data retention policies
- Data deletion procedures and mechanisms
- Data archiving procedures and mechanisms
- Legal hold
- Designing and Implementing Auditability, Traceability, and Accountability of Data Events
- Defining event sources and requirements of identity attribution
- SaaS event sources
- PaaS event sources
- IaaS event sources
- Identity attribution
- Logging, storing, and analyzing data events
- Collection
- Verification
- Storage and analysis
- Chain of custody and nonrepudiation
- Chapter 7 Domain 3: Cloud Platform and Infrastructure Security, Part 1
- Comprehending Cloud Infrastructure and Platform Components
- Physical environment
- Network and communications
- Compute
- VMs
- Containers
- Reservations, limits, and shares
- Virtualization
- Storage
- Volume storage
- Object storage
- Management plane
- Designing a Secure Data Center
- Logical design
- Physical design
- Location, location, location!
- Buildings and structures
- Physical security monitoring
- Physical testing and auditing
- Environmental design
- Designing for resilience
- Analyzing Risks Associated with Cloud Infrastructure and Platforms.
- Risk assessment and analysis
- Organizational risks
- Compliance and legal risks
- Cloud vulnerabilities, threats, and attacks
- Management plane compromise
- Incomplete data deletion and sanitization
- Insecure multitenancy
- Resource exhaustion
- Network, host, and application vulnerabilities
- Virtualization risks
- Architectural risks
- Hypervisor software risks
- Configuration risks
- Risk mitigation strategies
- Chapter 8 Domain 3: Cloud Platform and Infrastructure Security, Part 2
- Planning and Implementing Security Controls
- Physical and environmental protection
- System, storage, and communication protection
- Virtualization systems protection
- Vulnerability and configuration management
- Access management
- Network management
- Identification, authentication, and authorization in cloud infrastructure
- Identification
- Authentication
- Authorization
- Audit mechanisms
- Log collection
- Packet capture
- Planning Business Continuity (BC) and Disaster Recovery (DR)
- Business continuity and disaster recovery strategy
- Risks to traditional IT
- Risks to cloud-based BCDR
- Business requirements
- Creating, implementing, and testing BC and DR plans
- Scoping and assessment
- Creating, implementing, and testing your plan
- Chapter 9 Domain 4: Cloud Application Security, Part 1
- Advocating Training and Awareness for Application Security
- Cloud development basics
- Common pitfalls
- Migration and portability issues
- Integration issues
- Cloud environment challenges
- Insufficient documentation
- Common cloud vulnerabilities
- Access control vulnerabilities
- Internet-related vulnerabilities
- Data storage vulnerabilities
- Misuse vulnerabilities
- Describing the Secure Software Development Lifecycle (SDLC) Process
- Business requirements
- Phases
- Planning
- Defining
- Designing.
- Developing.