FileMood

Download CBR42758

CBR42758

Name

CBR42758

 DOWNLOAD Copy Link

Total Size

3.7 GB

Total Files

143

Hash

E6A7A95FEBAD69DFDD5DEC1BAAFEBD2A2E8AB98E

/

0 Architectural Concepts and Design Requirements -- 0 1.1 Domain 1 Overview.mp4

25.1 MB

0 Architectural Concepts and Design Requirements -- 1 1.2 Introduction to Cloud Concepts.mp4

75.2 MB

0 Architectural Concepts and Design Requirements -- 10 1.11 Cloud Service Models Part 3: PaaS.mp4

24.1 MB

0 Architectural Concepts and Design Requirements -- 11 1.12 Cloud Service Models Part 4: IaaS.mp4

81.7 MB

0 Architectural Concepts and Design Requirements -- 12 1.13 Pizza as a Service.mp4

105.5 MB

0 Architectural Concepts and Design Requirements -- 13 1.14 Cloud Computing Standards Roadmap Part 1.mp4

14.5 MB

0 Architectural Concepts and Design Requirements -- 14 1.15 Cloud Computing Standards Roadmap Part 2.mp4

94.0 MB

0 Architectural Concepts and Design Requirements -- 15 1.16 General Security Requirements.mp4

33.9 MB

0 Architectural Concepts and Design Requirements -- 16 1.17 Data States.mp4

45.2 MB

0 Architectural Concepts and Design Requirements -- 17 1.18 Removing Data Remnants.mp4

33.8 MB

0 Architectural Concepts and Design Requirements -- 18 1.19 Access Control.mp4

26.1 MB

0 Architectural Concepts and Design Requirements -- 19 1.20 Steps to Identity and Access Management.mp4

19.1 MB

0 Architectural Concepts and Design Requirements -- 2 1.3 Cloud Computing NIST SP 800-145.mp4

20.1 MB

0 Architectural Concepts and Design Requirements -- 20 1.21 Identity Proofing and Account Provisioning Part 1.mp4

31.7 MB

0 Architectural Concepts and Design Requirements -- 21 1.22 Identity Proofing and Account Provisioning Part 2.mp4

47.4 MB

0 Architectural Concepts and Design Requirements -- 22 1.23 API_s, SPML and SCIM.mp4

10.6 MB

0 Architectural Concepts and Design Requirements -- 23 1.24 Subject Identification.mp4

20.4 MB

0 Architectural Concepts and Design Requirements -- 24 1.25 Authentication.mp4

26.6 MB

0 Architectural Concepts and Design Requirements -- 25 1.26 Authorization.mp4

8.6 MB

0 Architectural Concepts and Design Requirements -- 26 1.27 Auditing_Accountability and Account Deprovisioning.mp4

14.6 MB

0 Architectural Concepts and Design Requirements -- 27 1.28 Virtualization.mp4

22.7 MB

0 Architectural Concepts and Design Requirements -- 28 1.29 Hypervisor Security.mp4

20.0 MB

0 Architectural Concepts and Design Requirements -- 29 1.30 Common Threats.mp4

38.3 MB

0 Architectural Concepts and Design Requirements -- 3 1.4 5 Characteristics of Cloud Computing.mp4

29.3 MB

0 Architectural Concepts and Design Requirements -- 30 1.31 Domain 1 Review.mp4

11.9 MB

0 Architectural Concepts and Design Requirements -- 4 1.5 NIST_s 5 Cloud Actors.mp4

41.0 MB

0 Architectural Concepts and Design Requirements -- 5 1.6 Cloud Actors and Functions.mp4

32.9 MB

0 Architectural Concepts and Design Requirements -- 6 1.7 Security Risks.mp4

54.5 MB

0 Architectural Concepts and Design Requirements -- 7 1.8 Cloud Deployment Models CCSP.mp4

57.0 MB

0 Architectural Concepts and Design Requirements -- 8 1.9 Cloud Service Models Part 1: Overview.mp4

10.5 MB

0 Architectural Concepts and Design Requirements -- 9 1.10 Cloud Service Models Part 2: SaaS.mp4

43.3 MB

1 Cloud Data Security -- 0 2.1 Domain 2 Overview.mp4

11.4 MB

1 Cloud Data Security -- 1 2.2 Data Security Lifecycle.mp4

30.4 MB

1 Cloud Data Security -- 10 2.11 Unauthorized User Access Part 6: Masking, Obfuscation, Anonymization and Tokenization.mp4

34.2 MB

1 Cloud Data Security -- 11 2.12 Unauthorized User Access Part 7: Data Loss Prevention (DLP).mp4

9.6 MB

1 Cloud Data Security -- 12 2.13 Unauthorized User Access Part 8: Trusted Platform Model (TPM) Chips.mp4

11.8 MB

1 Cloud Data Security -- 13 2.14 Unauthorized User Access Part 9: Anti-Malware.mp4

7.6 MB

1 Cloud Data Security -- 14 2.15 Unauthorized User Access Part 10: Removing Data Remnants.mp4

21.6 MB

1 Cloud Data Security -- 15 2.16 Unauthorized User Access Part 11: Monitoring.mp4

18.0 MB

1 Cloud Data Security -- 16 2.17 Liability Issues.mp4

43.9 MB

1 Cloud Data Security -- 17 2.18 Denial of Service.mp4

37.9 MB

1 Cloud Data Security -- 18 2.19 Integrity Issues.mp4

30.7 MB

1 Cloud Data Security -- 19 2.20 Cloud Security Alliance Cloud Controls Matrix.mp4

36.4 MB

1 Cloud Data Security -- 2 2.3 Storage Architectures.mp4

34.7 MB

1 Cloud Data Security -- 20 2.21 Policy Controls for Privacy and Data Protection.mp4

8.6 MB

1 Cloud Data Security -- 21 2.22 Domain 2 Review.mp4

9.0 MB

1 Cloud Data Security -- 3 2.4 Data Discovery Techniques.mp4

20.6 MB

1 Cloud Data Security -- 4 2.5 Threats to Data Storage.mp4

11.9 MB

1 Cloud Data Security -- 5 2.6 Unauthorized User Access Part 1: Overview.mp4

19.2 MB

1 Cloud Data Security -- 6 2.7 Unauthorized User Access Part 2: Data Classification.mp4

29.7 MB

1 Cloud Data Security -- 7 2.8 Unauthorized User Access Part 3: Strong Authentication.mp4

10.5 MB

1 Cloud Data Security -- 8 2.9 Unauthorized User Access Part 4: Information Rights Management.mp4

42.0 MB

1 Cloud Data Security -- 9 2.10 Unauthorized User Access Part 5: Encryption.mp4

35.6 MB

2 Cloud Platform and Infrastructure Security -- 0 3.1 Domain 3 Overview.mp4

9.1 MB

2 Cloud Platform and Infrastructure Security -- 1 3.2 Physical Environment of the Cloud Infrastructure.mp4

49.3 MB

2 Cloud Platform and Infrastructure Security -- 10 3.11 Further Attack Vectors.mp4

25.6 MB

2 Cloud Platform and Infrastructure Security -- 11 3.12 Countermeasures Across the Cloud.mp4

17.5 MB

2 Cloud Platform and Infrastructure Security -- 12 3.13 Virtualization Systems Controls.mp4

40.1 MB

2 Cloud Platform and Infrastructure Security -- 13 3.14 IAAA in the Cloud Infrastructure.mp4

14.3 MB

2 Cloud Platform and Infrastructure Security -- 14 3.15 Business Continuity and Disaster Recovery.mp4

22.6 MB

2 Cloud Platform and Infrastructure Security -- 15 3.16 BCDR Scenarios.mp4

15.6 MB

2 Cloud Platform and Infrastructure Security -- 16 3.17 The Business Impact Analysis (BIA).mp4

34.3 MB

2 Cloud Platform and Infrastructure Security -- 17 3.18 Strategy Risks.mp4

17.5 MB

2 Cloud Platform and Infrastructure Security -- 18 3.19 Creating the BCP.mp4

22.8 MB

2 Cloud Platform and Infrastructure Security -- 19 3.20 Testing the Plan.mp4

19.7 MB

2 Cloud Platform and Infrastructure Security -- 2 3.3 Network Functionality.mp4

26.2 MB

2 Cloud Platform and Infrastructure Security -- 20 3.21 Post-Incident Review.mp4

12.8 MB

2 Cloud Platform and Infrastructure Security -- 21 3.22 Physical and Environmental Controls.mp4

36.7 MB

2 Cloud Platform and Infrastructure Security -- 22 3.23 Data Center Operations.mp4

22.1 MB

2 Cloud Platform and Infrastructure Security -- 23 3.24 Domain 3 Review.mp4

11.9 MB

2 Cloud Platform and Infrastructure Security -- 3 3.4 Software Defined Networking.mp4

58.0 MB

2 Cloud Platform and Infrastructure Security -- 4 3.5 Hypervisors: TYPE I and TYPE II.mp4

37.5 MB

2 Cloud Platform and Infrastructure Security -- 5 3.6 Securing the Guest OS.mp4

21.8 MB

2 Cloud Platform and Infrastructure Security -- 6 3.7 Virtualization Concerns.mp4

64.4 MB

2 Cloud Platform and Infrastructure Security -- 7 3.8 Object Storage.mp4

31.8 MB

2 Cloud Platform and Infrastructure Security -- 8 3.9 Risk Assessment and Analysis in the Cloud.mp4

45.6 MB

2 Cloud Platform and Infrastructure Security -- 9 3.10 Legal.mp4

21.0 MB

3 Cloud Application Security -- 0 4.1 Domain 4 Overview.mp4

22.9 MB

3 Cloud Application Security -- 1 4.2 Determining Data Sensitivity.mp4

28.3 MB

3 Cloud Application Security -- 10 4.11 Vulnerability Databases and Resources.mp4

36.1 MB

3 Cloud Application Security -- 11 4.12 OWASP Top 10.mp4

36.1 MB

3 Cloud Application Security -- 12 4.13 Normative Frameworks.mp4

15.7 MB

3 Cloud Application Security -- 13 4.14 Identity and Access Management: Steps to Access Control.mp4

10.1 MB

3 Cloud Application Security -- 14 4.15 Managing SSO in the Cloud.mp4

50.8 MB

3 Cloud Application Security -- 15 4.16 SSO with SAML.mp4

23.8 MB

3 Cloud Application Security -- 16 4.17 Open ID Connect.mp4

9.7 MB

3 Cloud Application Security -- 17 4.18 OAUTH 2.0.mp4

15.2 MB

3 Cloud Application Security -- 18 4.19 Threat Modeling.mp4

9.1 MB

3 Cloud Application Security -- 19 4.20 Threat Modeling: Use_Misuse Cases.mp4

24.2 MB

3 Cloud Application Security -- 2 4.3 Cloud Application Architecture.mp4

8.9 MB

3 Cloud Application Security -- 20 4.21 Security Devices.mp4

22.7 MB

3 Cloud Application Security -- 21 4.22 Security Testing.mp4

14.0 MB

3 Cloud Application Security -- 22 4.23 Domain 4 Review.mp4

14.6 MB

3 Cloud Application Security -- 3 4.4 API_s: Access, Request and Response.mp4

57.5 MB

3 Cloud Application Security -- 4 4.5 Types of API_s.mp4

33.0 MB

3 Cloud Application Security -- 5 4.6 Common Pitfalls of Cloud Security Application Deployment.mp4

18.3 MB

3 Cloud Application Security -- 6 4.7 Multitenancy.mp4

19.0 MB

3 Cloud Application Security -- 7 4.8 Security Responsibilities Across Models.mp4

20.9 MB

3 Cloud Application Security -- 8 4.9 Software Development Lifecycle for the Cloud.mp4

38.1 MB

3 Cloud Application Security -- 9 4.10 Systems Development Lifecycle.mp4

4.6 MB

4 Operations -- 0 5.1 Domain 5 Overview.mp4

11.2 MB

4 Operations -- 1 5.2 Physical Design and Infrastructure.mp4

46.6 MB

4 Operations -- 10 5.11 VLANS.mp4

7.4 MB

4 Operations -- 11 5.12 Securing Virtual Machines.mp4

12.2 MB

4 Operations -- 12 5.13 Secure Network Configuration: DNS.mp4

31.9 MB

4 Operations -- 13 5.14 Maintenance Part 1: Patch Management.mp4

28.0 MB

4 Operations -- 14 5.15 Maintenance Part 2: Performance Monitoring Management Planning.mp4

12.3 MB

4 Operations -- 15 5.16 Network Security Controls.mp4

8.7 MB

4 Operations -- 16 5.17 IT Service Management (ITSM).mp4

14.3 MB

4 Operations -- 17 5.18 Operations Management.mp4

43.7 MB

4 Operations -- 18 5.19 Risk Management.mp4

39.4 MB

4 Operations -- 19 5.20 Risk Identification.mp4

18.3 MB

4 Operations -- 2 5.3 Secure Server Configuration Part 1.mp4

12.8 MB

4 Operations -- 20 5.21 Risk Analysis.mp4

29.0 MB

4 Operations -- 21 5.22 Risk Mitigation.mp4

30.5 MB

4 Operations -- 22 5.23 Risk Monitoring.mp4

21.8 MB

4 Operations -- 23 5.24 Domain 5 Review.mp4

14.0 MB

4 Operations -- 3 5.4 Secure Server Configuration Part 2.mp4

19.5 MB

4 Operations -- 4 5.5 Clustered Hosts.mp4

14.9 MB

4 Operations -- 5 5.6 Virtual Switches.mp4

8.5 MB

4 Operations -- 6 5.7 Assessing the Physical Infrastructure of a CSP.mp4

12.4 MB

4 Operations -- 7 5.8 Logical Security.mp4

18.5 MB

4 Operations -- 8 5.9 Network Isolation Security Zones.mp4

19.9 MB

4 Operations -- 9 5.10 Zone Architecture.mp4

25.2 MB

5 Legal and Compliance -- 0 6.1 Domain 6 Overview.mp4

11.9 MB

5 Legal and Compliance -- 1 6.2 Liabilities: Who is at Fault?.mp4

19.0 MB

5 Legal and Compliance -- 10 6.11 US Laws.mp4

15.5 MB

5 Legal and Compliance -- 11 6.12 ISO 27001 and 27002.mp4

22.9 MB

5 Legal and Compliance -- 12 6.13 E-Discovery and Forensics.mp4

24.8 MB

5 Legal and Compliance -- 13 6.14 Forensics.mp4

32.2 MB

5 Legal and Compliance -- 14 6.15 Volatility.mp4

17.1 MB

5 Legal and Compliance -- 15 6.16 Protecting the Integrity of Evidence.mp4

9.1 MB

5 Legal and Compliance -- 16 6.17 Audit.mp4

38.8 MB

5 Legal and Compliance -- 17 6.18 Domain 6 Review.mp4

10.3 MB

5 Legal and Compliance -- 18 6.19 The 6 Domains of CCSP: What Now?.mp4

26.0 MB

5 Legal and Compliance -- 2 6.3 Types of Laws.mp4

19.9 MB

5 Legal and Compliance -- 3 6.4 Intellectual Property.mp4

54.2 MB

5 Legal and Compliance -- 4 6.5 Framework and Guidelines.mp4

7.3 MB

5 Legal and Compliance -- 5 6.6 ISO 27018 CCSP.mp4

14.0 MB

5 Legal and Compliance -- 6 6.7 Generally Accepted Privacy Principles (GAPP).mp4

11.7 MB

5 Legal and Compliance -- 7 6.8 APEC.mp4

5.6 MB

5 Legal and Compliance -- 8 6.9 European Data Protection Directive.mp4

12.6 MB

5 Legal and Compliance -- 9 6.10 PIPEDA.mp4

3.9 MB

 

Total files 143


Copyright © 2024 FileMood.com