->

Ccsp Domain 4 - Cloud Application Secucurity

Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.72 GB | Duration: 2h 45m


 

Exam preparation - This domain is in alignment with the August 2022 exam outline

What you'll learn

Understand what (ISC)2 expects you to know about the Cloud Applications Security domain.

Comprehend

Explain

Understand

Requirements

There are no requirements.

A desire to learn what you need to know about the cloud application security for the CCSP exam is very beneficial to have.

A basic understanding of information security is recommended.

Description

In this course we walk through all of the critical concepts within the Cloud Application Security domain. This domain is 17% of the test as of August 2022. I will guide you through all of the concepts that you need to know and advise you on the level of knowledge that you need to get comfortable with.There are over two and a half hours of video content plus course notes based on information from my book: Cloud Guardians.We will explore the software development lifecycle (SDLC), to include the phases and the methodologies for moving through those phases.It is important to know the risks to applications including any that are cloud specific. We will talk about SQL injections and buffer overflows and the like. The more that you know of these threats from the Pand 11 to OWASP and the SANS Top 20 the better prepared you will be for the exam.Threat modeling techniques are also key. We will look at STRIDE and DREAD and a couple of others.Testing application is very critical. This is our most common attack point these days. We will talk about closed box and open box testing as well as DAST, SAST and IAST.There is also a great need to take care with the supply chain involved in creating software today. We have learned from recent attacks that the supply chain can be compromised.We finish with discussion about maturity models and data rights management/information rights management and maturity models.

Overview

Section 1: Introduction

Lecture 1 Introduction and What is Clean Code?

Lecture 2 Software Development Life Cycle (SDLC)

Lecture 3 Supply Chain Management

Lecture 4 Software Development Methodologies

Lecture 5 DevOps Practices

Lecture 6 Xtra -My thoughts numbers 4 the test

Lecture 7 D and DevSecOps

Lecture 8 Software Verification and Validation

Lecture 9 Software Testing

Lecture 10 SANS Top 10 of 25 Programming Errors

Lecture 11 OWASP Top 4 Programming Errors to know

Lecture 12 ISO 27034

Lecture 13 Sandbox

Lecture 14 Threat Modeling

Lecture 15 Orchestration

Section 2: Cryptography Basics

Lecture 16 Introduction to encryption

Lecture 17 Encrypting data in use

Lecture 18 Encrypting data at rest

Lecture 19 Encrypting data in motion - SSH

Lecture 20 Encrypting data in motion - TLS

Lecture 21 Encrypting data in motion - IPSec

Lecture 22 Symmetric encryption

Lecture 23 Introduction to Asymmetric

Lecture 24 Use of public and private keys

Lecture 25 Key storage location

Section 3: Identity and Access Management

Lecture 26 Basic IAAA Introduction

Lecture 27 Single Sign On (SSO)

Lecture 28 SAML

Lecture 29 CASB

This course is intended for people that are preparing for the (ISC)2 CCSP exam.,This course would benefit anyone working to expand their knowledge and understanding of the Cloud Application Security.

HomePage:

https://www.udemy.com/course/ccsp-domain-4-cloud-application-secucurity/

 

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss