Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

By : Omar A. Turner, Navya Lakshmana
4.9 (22)
close
close
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

4.9 (22)
By: Omar A. Turner, Navya Lakshmana

Overview of this book

Preparing for the Certified Cloud Security Professional (CCSP) exam can be challenging, as it covers a wide array of topics essential for advancing a cybersecurity professional’s career by validating their technical skills. To prepare for the CCSP exam, you need a resource that not only covers all the exam objectives but also helps you prepare for the format and structure of the exam. Written by two seasoned cybersecurity professionals with a collective experience of hundreds of hours training CCSP bootcamps, this CCSP study guide reflects the journey you’d undertake in such training sessions. The chapters are packed with up-to-date information necessary to pass the (ISC)2 CCSP exam. Additionally, to boost your confidence, the book provides self-assessment questions, exam tips, and mock exams with detailed answer explanations. You’ll be able to deepen your understanding using illustrative explanations that briefly review key points. As you progress, you’ll delve into advanced technical aspects of cloud domain security, such as application security, design, managing and securing data, and infrastructure in the cloud using best practices and legal policies and procedures. By the end of this guide, you’ll be ready to breeze through the exam and tackle real-world cloud security challenges with ease.
Table of Contents (27 chapters)
close
close

What This Book Covers

Chapter 1, Core Cloud Concepts, introduces the most relevant cloud computing characteristics and concepts with regard to cloud service models, cloud deployment models, and the different types of stakeholders in cloud computing.

Chapter 2, Cloud Reference Architecture, covers the cloud reference architecture, cloud service models, cloud deployment models, and cloud capabilities. We will also introduce the shared considerations for cloud deployments and the impact of new and emerging technologies on the evolution of cloud computing.

Chapter 3, Top Threats and Essential Cloud Security Concepts and Controls, describes the common threats to cloud deployments and attack vectors. We will introduce the control frameworks and control types necessary to secure data, network, and virtualization layers for cloud computing.

Chapter 4, Design Principles for Secure Cloud Computing, focuses on the service model security considerations.

Chapter 5, How to Evaluate Your Cloud Service Provider, discusses how to review and understand key cloud service contractual documents from the perspective of cloud service consumers. We will provide the best practices on how to evaluate your CSP based on a set of criteria.

Chapter 6, Cloud Data Security Concepts and Architectures, describes cloud data concepts, cloud data storage architectures, data security, data classification, and cloud data security technologies. We will review the stages of the cloud data life cycle in cloud environments, from creation to safe destruction practices.

Chapter 7, Data Governance Essentials, reviews the most important concepts of governance oversight for data life cycle phases in the cloud environment. We will introduce the concepts of Information Rights Management (IRM) and best practices for auditability, traceability, and accountability when it comes to data use in cloud environments.

Chapter 8, Essential Infrastructure and Platform Components for a Secure Data Center, reviews key cloud infrastructure and platform components and the best practices for the secure design of the logical, physical, and environmental components of a modern data center.

Chapter 9, Analyzing Risks, identifies the top risks to the physical, logical, and virtual environments as a cloud consumer and provider. We will discuss how to analyze, assess, and address the risk with safeguards and countermeasures.

Chapter 10, Security Control Implementation, provides an overview of the key concepts of the selection, planning, and implementation of security controls in cloud environments.

Chapter 11, Planning for the Worst-Case Scenario – Business Continuity and Disaster Recovery, discusses how organizations are preparing to withstand disasters and business disruptions to be able to continue the delivery of products and services within acceptable time frames.

Chapter 12, Application Security, reviews development basics, the challenges organizations face, and the common cloud vulnerabilities for web applications.

Chapter 13, Secure Software Development Life Cycle, is dedicated to educating you on the Secure Software Development Life Cycle (S-SDLC), including coverage of topics such as defining requirements, what methodology to use to apply the S-SDLC, threat modeling, and secure coding.

Chapter 14, Assurance, Validation, and Verification in Security, describes key processes as they relate to functional testing, profiling security testing methodologies, QA, and other solutions.

Chapter 15, Application-Centric Cloud Architecture, reviews the important specifics of traditional cloud application architecture, with a focus on essential security components such as WAF, DAM, API gateways, cryptography, sandboxing, and securing virtualized applications.

Chapter 16, IAM Design, focuses on Identity and Access Management (IAM) solutions, which are critical elements of securing organizations. This chapter covers identity providers, federated identities, secrets management, and other important IAM solutions.

Chapter 17, Cloud Physical and Logical Infrastructure (Operationalization and Maintenance), reviews the key physical and logical infrastructure configuration requirements for cloud environments. We will also provide an overview of the most common configurations and controls for operational and maintenance activities for physical and logical infrastructures.

Chapter 18, International Operational Controls and Standards, reviews the leading industry standards for Information Technology Service Management (ITSM).

Chapter 19, Digital Forensics, discusses forensic data collection methodologies, evidence management, and other key concepts for the collection, acquisition, and preservation of digital evidence.

Chapter 20, Managing Communications, covers the best practices for the communication channels and procedures that need to be set up if an organization intends to be resilient against impacts of all types. We will review the most common communication channels with vendors, customers, regulators, partners, and other stakeholders.

Chapter 21, Security Operations Center Management, covers the best practices for establishing the primary requirements of a security operations center and how they are informed by the business mission, regulatory and legal requirements, and service offerings. We will review a wide range of tools related to monitoring and logging that are necessary for effective security operations center management.

Chapter 22, Legal Challenges and the Cloud, discusses compliance with legal and contractual requirements. The chapter covers in detail the policies, standards, guidelines, baselines, and procedures that frame decision-making, as well as the roles that delineate authority levels (e.g., shareholders, stakeholders, senior management, service consumers, and service providers).

Chapter 23, Privacy and the Cloud, discusses privacy regulations and country-specific legislation related to PII and PHI. We will review key jurisdictional differences in data privacy.

Chapter 24, Cloud Audit Processes and Methodologies, reviews the most common ways to conduct audits of IT systems, covering the audit process, the methodologies, and the required adaptations for a cloud environment.

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY