CCSP Domain 5 | Cloud Security Operations
#ccsp #ccsptraining #cloudsecurity I have covered CCSP domain 5 in this video and explained the below topics. Implement and Build Physical and Logical Infrastructure for Cloud Environment » Hardware Specific Security Configuration Requirements (e.g., Basic Input Output System (BIOS), settings for virtualization and Trusted Platform Module (TPM), storage controllers, network controllers) » Installation and Configuration of Virtualization Management Tools » Virtual Hardware Specific Security Configuration Requirements (e.g., network, storage, memory, Central Processing Unit (CPU)) » Installation of Guest Operating System (OS) Virtualization Toolsets Operate Physical and Logical Infrastructure for Cloud Environment » Configure Access Control for Local and Remote Access (e.g., Secure Keyboard Video Mouse (KVM), console-based access mechanisms, Remote Desktop Protocol (RDP)) » Secure Network Configuration (e.g., Virtual Local Area Networks (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Virtual Private Network (VPN)) » Operating System (OS) Hardening Through the Application of Baselines (e.g., Windows, Linux, VMware) » Availability of Stand-Alone Hosts » Availability of Clustered Hosts (e.g., Distributed Resource Scheduling (DRS), Dynamic Optimization (DO), storage clusters, maintenance mode, High Availability) » Availability of Guest Operating System (OS) Manage Physical and Logical Infrastructure for Cloud Environment » Access Controls for Remote Access (e.g., Remote Desktop Protocol (RDP), Secure Terminal Access, Secure Shell (SSH)) » Operating System (OS) Baseline Compliance Monitoring and Remediation » Patch Management » Performance and Capacity Monitoring (e.g., network, compute, storage, response time) » Hardware Monitoring (e.g., Disk, Central Processing Unit (CPU), fan speed, temperature » Configuration of Host and Guest Operating System (OS) Backup and Restore Functions » Network Security Controls (e.g., firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), honeypots, vulnerability assessments, network security groups) » Management Plane (e.g., scheduling, orchestration, maintenance) Implement Operational Controls and Standards » Change Management » Continuity Management » Information Security Management » Continual Service Improvement Management » Incident Management » Problem Management » Release Management » Deployment Management » Configuration Management » Service level Management » Availability Management » Capacity Management Support Digital Forensics » Forensic Data Collection Methodologies » Evidence Management » Collect, Acquire and Preserve Digital Evidence Manage Communication with Relevant Parties » Vendors » Customers » Partners » Regulators » Other Stakeholders Manage Security Operations Tags cloud security in cloud computing cloud security course data security in cloud cloud security course free ccsp training videos ccsp training online ccsp training material ccsp 2021 ccsp study ccsp study tips ccsp study plan ccsp touchpoint For daily tips, please connect Twitter - https://twitter.com/kd_cybertalks Linkedin - https://www.linkedin.com/in/kd-cybertalks-39031a20a/
Download
0 formatsNo download links available.