Cloud Security Specialist Certification Self-Study Kit Bundle



Similar documents
Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Storage Specialist Certification Self-Study Kit Bundle

Cloud Architect Certification Self-Study Kit Bundle

Cloud Certified Professional (CCP)

Cloud Courses Description

Big Data Governance Certification Self-Study Kit Bundle

Cloud Courses Description

Big Data Architect Certification Self-Study Kit Bundle

The Service, The Cloud & The Method: The Connection Points

Big Data Governance Certification Self-Study Kit Bundle

Security Issues in Cloud Computing

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

SOA Architect Certification Self-Study Kit Bundle

Fundamental Concepts and Models

SOA CERTIFIED JAVA DEVELOPER (7 Days)

Cloud Essentials for Architects using OpenStack

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Fundamental Concepts and Models

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Accelerate Your Enterprise Private Cloud Initiative

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

SOA CERTIFIED CONSULTANT

Trust and Dependability in Cloud Computing

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

SOA C90-02A. Cloud Technology Concepts. Practice Test. Version: QQ:

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

This course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include:

SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM

Designing a Data Solution with Microsoft SQL Server 2014

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server 2014

OVERVIEW Cloud Deployment Services

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

EXIN Cloud Computing Foundation

Course 20465: Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server

6 Cloud computing overview

Architecting the Cloud

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Cloud Computing Standards: Overview and first achievements in ITU-T SG13.

NCTA Cloud Architecture

Cloud Computing and Standards

Hybrid Cloud Computing

20465: Designing a Data Solution with Microsoft SQL Server

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

Building Private & Hybrid Cloud Solutions

Payment Card Industry Data Security Standard

Seeing Though the Clouds

Top 10 Cloud Risks That Will Keep You Awake at Night

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Implementing Cisco IOS Network Security v2.0 (IINS)

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

HP Certified Professional

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

How To Secure Cloud Computing

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Cloud security architecture

VMware vcloud Powered Services

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Planning, Deploying, and Managing an Enterprise Project Management Solution

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Security Inspection Inc. Solutions to secure your network

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

A Secure System Development Framework for SaaS Applications in Cloud Computing

CHAPTER 8 CLOUD COMPUTING

Index. BIOS rootkit, 119 Broad network access, 107

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

ITIL: Planning, Protection & Optimization (PPO) (Revision 1.6)

20465C: Designing a Data Solution with Microsoft SQL Server

Cloud Computing for SCADA

How To Manage Cloud Data Safely

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Table of Contents. Introduction. Audience. At Course Completion

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

DevOps Course Content

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Assessing Risks in the Cloud

Cloud Customer Architecture for Web Application Hosting, Version 2.0

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Transcription:

Cloud Security Specialist Certification Bundle CloudSchool.com CLOUD CERTIFIED Technology Professional This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Cloud Secutiry Specialist Certification. The bundle includes the following self-study kits: CCP Module 1 : Fundamental Cloud Computing (Exam C90.01) End-to-end coverage of fundamental cloud computing topics as they apply to technology and business considerations, including concepts, terminology, benefits, challenges and models. CCP Module 2 : Cloud Technology Concepts (Exam C90.02) Technology mechanisms, basic security topis, and architectual fundamentals are covered, along with cloud storage, cloud testing, and emerging technology related topics. CCP Module 7 : Fundamental Cloud Security (Exam C90.07) This course dives into the implementation technologies behind the cloud security mechanisms first introduced in Module 2, and further explores how these mechanisms and associated security technologies can be configured and combined to establish a cloud security architecture. CCP Module 8 : Advanced Cloud Security (Exam C90.08) Complex security topics are addressed by this course, which introduces a set of security design patterns that address the application of cloud security mechanisms and technologies in order to establish sophisticated, custom security controls for preventative and reactionary responses to common threats and attacks. CCP Module 9 : Cloud Security Lab (Exam C90.09) A hands-on lab during which participants apply the patterns, concepts, techniques, and mechanisms covered in previous courses, in order to complete a series of exercises that present real-world security problems. By purchasing these kits as part of this bundle you receive a 20% discount. This CCP courses in this self-study kit bundle cover a range of topics that are further elaborated by detailed technical coverage and case study examples in the accompanying Cloud Computing: Concepts, Technology & Architecture text book from the acclaimed Prentice Hall Service

CCP Module 1: Fundamental Cloud Computing This foundational course provides end-to-end coverage of fundamental cloud computing topics as they pertain to both technology and business considerations. The course content is divided into a series of modular sections, each of which is accompanied by one or more hands-on exercises. The following primary topics are covered: Fundamental Cloud Computing Terminology and Concepts Basics of Virtualization Specific Characteristics that Define a Cloud Understanding Elasticity, Resiliency, On-Demand and Measured Usage Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services Cloud Resource Administrator and Cloud Service Owner Roles Cloud Service and Cloud Service Consumer Roles Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) Cloud Delivery Models Combining Cloud Delivery Models Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs Service Level Agreements (SLAs) for Cloud-based IT Resources Formulas for Calculating and Rating SLA Quality of Service Characteristics separately as part of the Module 1, which includes designed to prepare you for Exam C90.01 and are also suitable

CCP Module 2: Cloud Technology Concepts This course explores a range of the most important and relevant technology-related topics that pertain to contemporary cloud computing platforms. The course content does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and data processing. Proven technologies are defined and classified as concrete architectural building blocks called mechanisms. The purpose of this course is to introduce cloud computing-related technology topics in a manner that is accessible to a wide range of IT professionals, as well as to empower participants with an understanding of the fundamental mechanics of a cloud platform, how the different moving parts can be combined, and how to address common threats and pitfalls. The following primary topics are covered: Cloud Computing Mechanisms that Establish Architectural Building Blocks Virtual Servers, Ready-Made Environments, Failover Systems & Pay-for-Use Monitors Cloud Balancing and Cloud Bursting Architectures Common Risks, Threats and Vulnerabilities of Cloud-based Services & Cloud-hosted Solutions Cloud Security Mechanisms Used to Counter Threats and Attacks Understanding Cloud-Based Security Groups and Hardened Virtual Server Images Cloud Service Implementation Mediums (including Web Services and REST Services) Cloud Storage Benefits and Challenges Cloud Storage Services, Technologies and Approaches Non-Relational (NoSQL) Storage Compared to Relational Storage Cloud Service Testing Considerations and Testing Types separately as part of the Module 2, which includes designed to prepare you for Exam C90.02 and are also suitable

CCP Module 7: Fundamental Cloud Security This foundational course provides a well-rounded, end-to-end presentation of essential techniques, patterns and industry technologies for establishing cloud-based security controls and security architectures. The cloud security fundamentals covered in Module 2 are continued by introducing threat categorizations and new cloud security mechanisms. The course then delves into a series of cloud security patterns that explore a variety of topics, including cloud network security, identity and access management, and trust assurance. The following topics are covered: Cloud Security Basics and Common Cloud Security Mechanisms Cloud Security Threats and Threat Categorization Methodology Identification and Treatment of Common Threats Cloud Network Security Patterns and Supporting Mechanisms Securing Network Connections and Cloud Authentication Gateways Collaborative Monitoring and Logging, Independent Cloud Auditing Cloud Identity and Access Management Patterns and Supporting Mechanisms Federating and Enabling Secure Interoperability among Cloud Consumers Trust Assurance Patterns and Supporting Mechanisms Trust Attestation and Establishing Trustworthiness separately as part of the Module 7, which includes designed to prepare you for Exam C90.07 and are also suitable

CCP Module 8: Advanced Cloud Security This advanced course covers cloud security mechanisms and architectural design patterns that address data and access control security for virtual machines, as well as trust boundaries, geotagging and BIOS security. The course also explains common methods used by attackers to breach organizational resources and provides a methodology for countering such attacks. The course concludes by demonstrating the relationship between threats, attacks, and risks via threat modeling. The following topics are covered: Cloud Service Security Patterns and Supporting Mechanisms Virtual Machine Platform Protection Patterns Considerations for Setting Up Secure Ephemeral Perimeters Trusted Cloud Resource Pools and Cloud Resource Access Control Permanent Data Access Loss Protection and Cloud Data Breach Protection Isolated Trust Boundaries The Attack Lifecycle and the Security Lifecycle Proactive Mitigation vs. Incidence Response Threats, Vulnerabilities, Impacts from Exploitation Threat Modeling, Threats and Mitigations The materials for this course module can be purchased separately as part of the Module 8, which includes designed to prepare you for Exam C90.08 and are also suitable

CCP Module 9: Cloud Security Lab As a continuation of Modules 7 and 8, this lab-style course provides a series of handson exercises that enable participants to apply their knowledge. Participants will apply different combinations of cloud security patterns and mechanisms in order to complete a series of exercises pertaining to solving cloud security, risk, compliance and asset protection-related scenarios and problems. separately as part of the Module 9, which includes designed to prepare you for Exam C90.09 and are also suitable