Description: Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing, deploying, and administrating a cloud datacenter and service. In addition, the course will cover the techniques that can be deployed to configure and protect hardware assets – physical and virtualized, manage and protect configuration settings, and keep network data moving in and out of, and hosted within the domain of the datacenter. Topics include regulation compliance, protection techniques, and controlled access to the various components of a cloud data center infrastructure. In this course, you will learn about the deployment of auditing and monitoring techniques, event logging and reporting, and other aspects of management techniques associated with cloud-hosted services. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination – Domain 5 requirements.

Target Audience: This course is intended for IT professionals including managers, engineers, and technical staff intending to take the CCSP examination.

Duration: 03:01

Description: In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must be security-aware and must protect cloud-hosted applications and data from an increasing attack vector density. This course covers various aspects of cloud computing relating to the security of cloud-based application software and supporting hardware and services. The course outlines various aspects of application security and access, including designing in security, peripheral security components, and securing access to services and hosted applications. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination – Domain 4 requirements.

Target Audience: This course is intended for IT professionals including managers, engineers, and technical staff intending to take the CCSP examination.

Duration: 02:14

Description: The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating to the security of the supporting components of the cloud infrastructure – both physical and virtual components. The course promotes/outlines a risk management approach in developing and employing security measures to protect cloud components; describes key risk management focus areas – identification, measurement, and control; and covers known threats and the key areas of cloud component vulnerability. In this course, you will learn about security management/measures and auditing, including authentication, authorization, Business Continuity (BC), Disaster Recovery (DR), and failover. The learner will be expected to display knowledge of Cloud Service Business Continuity and Disaster Recovery planning, to identify areas requiring specific security protection, and how to recover lost or damaged data and components hosted on a cloud platform. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination – Domain 3 requirements.

Target Audience: This course is intended for IT professionals including managers, engineers, and technical staff intending to take the CCSP examination.

Duration: 01:59

Description: In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and explores issues relating to the management and protection of data assets hosted on a cloud platform, and data in transit to and from a cloud platform. In this course, you will learn about all aspects of data management: protection, auditing, access, legislative impact, storage, deletion, security, ownership, data rights management, encryption, classification, known threats to data assets, and threat mitigation. The course covers the essential topics for the ICS2’s Certified Cloud Security Professional examination – Domain 2 requirements.

Target Audience: This course is intended for IT professionals including managers, engineers, and technical staff intending to take the CCSP examination.

Duration: 01:55

Description: Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural design, and defines associated cloud systems and cloud components. In addition to Cloud Reference Architecture, the course outlines definitions and roles, computing characteristics, and cloud deployment models. In this course, you will learn about cloud security, cloud networks, virtualization within the cloud system, data encryption and aspects of cloud interoperability, trusted cloud services, cloud system management, and operational considerations. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination – Domain 1 requirements.

Target Audience: This course is intended for IT professionals including managers, engineers, and technical staff intending to take the CCSP examination.

Duration: 02:09