ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.3 GB
  • Uploaded By freecoursewb
  • Downloads 277
  • Last checked 16 hours ago
  • Date uploaded 5 months ago
  • Seeders 12
  • Leechers 6

Infohash : 0DB7C1E228FA8E4F42D52921931AF454AE73BB03



ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

https://WebToolTip.com

Released: 07/2025
Duration: 10h 2m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 1.28 GB
Level: Intermediate | Genre: eLearning | Language: English

The CCSP exam nstrates professionals have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud. This course helps you build the knowledge and understanding you need to take the exam successfully. Learn about cloud concepts, architecture, and design. Explore cloud data security, cloud platform, and infrastructure security. Deep dive into cloud application security and cloud security operations. Plus, build your understanding of legal, risk, and compliance.
This course was created by Cybrary. We are pleased to host this training in our library.

Files:

[ WebToolTip.com ] ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 01 - Introduction to CCSP.mp4 (11.3 MB)
    • 01 - Introduction to CCSP.srt (9.2 KB)
    02 - 1. Cloud Concepts, Architecture, and Design
    • 01 - Domain 1 overview.mp4 (2.2 MB)
    • 01 - Domain 1 overview.srt (2.1 KB)
    • 02 - Cloud computing definitions, roles, and responsibilities.mp4 (25.0 MB)
    • 02 - Cloud computing definitions, roles, and responsibilities.srt (20.1 KB)
    • 03 - Key cloud computing characteristics.mp4 (16.0 MB)
    • 03 - Key cloud computing characteristics.srt (11.8 KB)
    • 04 - Building block technologies.mp4 (13.0 MB)
    • 04 - Building block technologies.srt (12.3 KB)
    • 05 - Cloud activities, service capabilities and categories, and deployment models.mp4 (16.2 MB)
    • 05 - Cloud activities, service capabilities and categories, and deployment models.srt (14.5 KB)
    • 06 - Cloud shared considerations.mp4 (14.4 MB)
    • 06 - Cloud shared considerations.srt (12.8 KB)
    • 07 - Impact of related technologies.mp4 (21.7 MB)
    • 07 - Impact of related technologies.srt (18.6 KB)
    • 08 - Cryptography and key management.mp4 (6.9 MB)
    • 08 - Cryptography and key management.srt (6.8 KB)
    • 09 - Identity and access control.mp4 (10.3 MB)
    • 09 - Identity and access control.srt (9.9 KB)
    • 10 - Data and media sanitization.mp4 (6.8 MB)
    • 10 - Data and media sanitization.srt (6.6 KB)
    • 11 - Network security.mp4 (16.3 MB)
    • 11 - Network security.srt (13.3 KB)
    • 12 - Virtualization security.mp4 (17.1 MB)
    • 12 - Virtualization security.srt (15.9 KB)
    • 13 - Common threats.mp4 (7.5 MB)
    • 13 - Common threats.srt (6.0 KB)
    • 14 - Security hygiene.mp4 (12.1 MB)
    • 14 - Security hygiene.srt (11.2 KB)
    • 15 - Cloud secure data lifecycle.mp4 (6.9 MB)
    • 15 - Cloud secure data lifecycle.srt (6.5 KB)
    • 16 - Business continuity and disaster recovery in the cloud.mp4 (14.2 MB)
    • 16 - Business continuity and disaster recovery in the cloud.srt (12.1 KB)
    • 17 - Business impact analysis and functional security requirements.mp4 (16.1 MB)
    • 17 - Business impact analysis and functional security requirements.srt (11.9 KB)
    • 18 - Service model security considerations and cloud design patterns.mp4 (12.9 MB)
    • 18 - Service model security considerations and cloud design patterns.srt (9.7 KB)
    • 19 - DevOps security.mp4 (6.4 MB)
    • 19 - DevOps security.srt (4.6 KB)
    • 20 - Verifications and certifications using common standards.mp4 (13.8 MB)
    • 20 - Verifications and certifications using common standards.srt (9.7 KB)
    03 - 2. Cloud Data Security
    • 01 - Domain 2 overview.mp4 (1.4 MB)
    • 01 - Domain 2 overview.srt (1.2 KB)
    • 02 - Cloud data life cycle, data dispersion, and data flows.mp4 (14.7 MB)
    • 02 - Cloud data life cycle, data dispersion, and data flows.srt (14.3 KB)
    • 03 - Storage types.mp4 (20.9 MB)
    • 03 - Storage types.srt (15.4 KB)
    • 04 - Storage threats.mp4 (15.2 MB)
    • 04 - Storage threats.srt (12.0 KB)
    • 05 - Encryption and key management.mp4 (25.3 MB)
    • 05 - Encryption and key management.srt (17.4 KB)
    • 06 - Hashing, data obfuscation, and tokenization.mp4 (18.8 MB)
    • 06 - Hashing, data obfuscation, and tokenization.srt (16.1 KB)
    • 07 - Data loss prevention, keys, secrets, and certificates.mp4 (21.4 MB)
    • 07 - Data loss prevention, keys, secrets, and certificates.srt (16.6 KB)
    • 08 - Different structures of data and data location.mp4 (14.1 MB)
    • 08 - Different structures of data and data location.srt (12.7 KB)
    • 09 - Data classification policies.mp4 (9.4 MB)
    • 09 - Data classification policies.srt (8.5 KB)
    • 10 - Data mapping and labeling.mp4 (7.6 MB)
    • 10 - Data mapping and labeling.srt (7.5 KB)
    • 11 - Information rights management.mp4 (12.8 MB)
    • 11 - Information rights management.srt (11.1 KB)
    • 12 - Data retention policies.mp4 (15.7 MB)
    • 12 - Data retention policies.srt (13.7 KB)
    • 13 - Data deletion, archiving, and legal hold.mp4 (16.6 MB)
    • 13 - Data deletion, archiving, and legal hold.srt (11.3 KB)
    • 14 - Enable data audit, trace, and accountability.mp4 (16.6 MB)
    • 14 - Enable data audit, trace, and accountability.srt (12.7 KB)
    04 - 3. Cloud Platform and Infrastructure Security
    • 01 - Domain 3 overview.mp4 (1.6 MB)
    • 02 - Physical environment.mp4 (10.2 MB)
    • 02 - Physical environment.srt (7.6 KB)
    • 03 - Network communications and computing.mp4 (9.7 MB)
    • 04 - Virtualization.mp4 (13.0 MB)
    • 04 - Virtualization.srt (11.5 KB)
    • 05 - Storage.mp4 (8.3 MB)
    • 05 - Storage.srt (7.3 KB)
    • 06 - Management plane.mp4 (13.6 MB)
    • 06 - Management plane.srt (11.4 KB)
    • 07 - Design a secure data center.mp4 (21.3 MB)
    • 07 - Design a secure data center.srt (16.3 KB)
    • 08 - Risk analysis.mp4 (9.6 MB)
    • 08 - Risk analysis.srt (7.8 KB)
    • 09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.mp4 (12.5 MB)
    • 09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.srt (11.2 KB)
    • 10 - Physical and environmental protection.mp4 (9.4 MB)
    • 11 - System, storage, and communication protection.mp4 (5.9 MB)
    • 11 - System, storage, and communication protection.srt (4.8 KB)
    • 12 - Identification, authentication, and authorization in the cloud.mp4 (13.8 MB)
    • 12 - Identification, authentication, and authorization in the cloud.srt (10.5 KB)
    • 13 - Audit mechanisms.mp4 (14.7 MB)
    • 13 - Audit mechanisms.srt (10.9 KB)
    • 14 - Business continuity (BC) and disaster recovery (DR) strategies.mp4 (8.2 MB)
    • 14 - Business continuity (BC) and disaster recovery (DR) strategies.srt (6.5 KB)
    • 15 - Business requirements.mp4 (11.8 MB)
    • 16 - BC and DR planning and testing.mp4 (17.1 MB)
    • 16 - BC and DR planning and testing.srt (11.6 KB)
    05 - 4. Cloud Application Security
    • 01 - Domain 4 overview.mp4 (3.6 MB)
    • 01 - Domain 4 overview.srt (3.6 KB)
    • 02 - Cloud development basics, common pitfalls, and vulnerabilities.mp4 (28.4 MB)
    • 02 - Cloud development basics, common pitfalls, and vulnerabilities.srt (21.8 KB)
    • 03 - Secure software development.mp4 (9.2 MB)
    • 03 - Secure software development.srt (6.9 KB)
    • 04 - Business requirements, phases, and methodologies.mp4 (10.9 MB)
    • 04 - Business requirements, phases, and methodologies.srt (8.1 KB)
    • 05 - Cloud specific risks.mp4 (20.9 MB)
    • 05 - Cloud specific risks.srt (16.7 KB)
    • 06 - Threat modeling.mp4 (13.5 MB)
    • 06 - Threat modeling.srt (11.4 KB)
    • 07 - Layered security, secure coding, and configuration.mp4 (8.8 MB)
    • 07 - Layered security, secure coding, and configuration.srt (6.1 KB)
    • 08 - Cloud software assurance and validation.mp4 (15.0 MB)
    • 08 - Cloud software assurance and validation.srt (11.3 KB)
    • 09 - Application testing.mp4 (12.4 MB)
    • 09 - Application testing.srt (8.4 KB)
    • 10 - Securing APIs and supply chains.mp4 (7.0 MB)
    • 10 - Securing APIs and supply chains.srt (4.9 KB)
    • 11 - Validating and managing third-party and open-source software.mp4 (7.7 MB)
    • 11 - Validating and managing third-party and open-source software.srt (6.1 KB)
    • 12 - Supplemental security components.mp4 (16.8 MB)
    • 12 - Supplemental security components.srt (12.6 KB)
    • 13 - Cryptography, sandboxing, virtualization, and orchestration.mp4 (22.2 MB)
    • 13 - Cryptography, sandboxing, virtualization, and orchestration.srt (14.9 KB)
    • 14 - Federated identity, identity providers (IdP), and SSO.mp4 (13.4 MB)
    • 14 - Federated identity, identity providers (IdP), and SSO.srt (9.9 KB)
    • 15 - MFA, cloud access security brokers, and secrets management.mp4 (12.9 MB)
    • 15 - MFA, cloud access security brokers, and secrets management.srt (9.4 KB)
    06 - 5. Cloud Security Operations
    • 01 - Domain 5 overview.mp4 (3.8 MB)
    • 01 - Domain 5 overview.srt (3.2 KB)
    • 02 - Hardware security.mp4 (9.4 MB)
    • 02 - Hardware security.srt (6.9 KB)
    • 03 - Virtualization management, security, and tool sets.mp4 (11.4 MB)
    • 03 - Virtualization management, security, and tool sets.srt (8.2 KB)
    • 04 - Remote access.mp4 (9.3 MB)
    • 04 - Remote access.srt (7.1 KB)
    • 05 - Secure network configurations and controls.mp4 (29.9 MB)
    • 05 - Secure network configurations and controls.srt (18.7 KB)
    • 06 - Operating system hardening and configuration.mp4 (14.8 MB)
    • 06 - Operating system hardening and configuration.srt (10.4 KB)
    • 07 - Availability of hosts and guest operating systems.mp4 (23.9 MB)
    • 07 - Availability of hosts and guest operating systems.srt (14.0 KB)
    • 08 - Performance, capacity, and hardware monitoring.mp4 (14.4 MB)
    • 08 - Performance, capacity, and hardware monitoring.srt (10.2 KB)
    • 09 - Infrastructure as code and the management plane.mp4 (14.3 MB)
    • 09 - Infrastructure as code and the management plane.srt (9.4 KB)
    • 10 - Program management, part 1.mp4 (17.3 MB)
    • 10 - Program management, part 1.srt (12.6 KB)
    • 11 - Program management, part 2.mp4 (17.1 MB)
    • 11 - Program management, part 2.srt (12.5 KB)
    • 12 - Program management, part 3.mp4 (17.3 MB)
    • 12 - Program management, part 3.srt (12.4 KB)
    • 13 - Program management, part 4.mp4 (14.1 MB)
    • 13 - Program management, part 4.srt (10.4 KB)
    • 14 - Forensics, evidence collection, and preservation.mp4 (27.4 MB)
    • 14 - Forensics, evidence collection, and preservation.srt (20.3 KB)
    • 15 - Communication and cloud stakeholders.mp4 (12.3 MB)
    • 15 - Communication and cloud stakeholders.srt (10.9 KB)
    • 16 - Security operations and intelligent monitoring.mp4 (16.6 MB)
    • 16 - Security operations and intelligent monitoring.srt (10.3 KB)
    • 17 - Logging, incident management, and vulnerability assessments.mp4 (30.2 MB)
    • 17 - Logging, incident management, and vulnerability assessments.srt (22.9 KB)
    07 - 6. Legal, Risk, and Compliance
    • 01 - Domain 6 overview.mp4 (3.7 MB)
    • 01 - Domain 6 overview.srt (3.5 KB)
    • 02 - Cloud legal requirements.mp4 (10.0 MB)
    • 02 - Cloud legal requirements.srt (9.2 KB)
    • 03 - Legal frameworks and forensics.mp4 (25.2 MB)
    • 03 - Legal frameworks and forensics.srt (20.5 KB)
    • 04 - Privacy in the cloud, part 1.mp4 (14.0 MB)
    • 04 - Privacy in the cloud, part 1.srt (8.1 KB)
    • 05 - Privacy in the cloud, part 2.mp4 (13.5 MB)
    • 05 - Privacy in the cloud, part 2.srt (8.7 KB)
    • 06 - Cloud auditing.mp4 (19.0 MB)
    • 06 - Cloud auditing.srt (13.2 KB)
    • 07 - Audit analysis.mp4 (17.7 MB)
    • 07 - Audit analysis.srt (12.8 KB)
    • 08 - Distributed infrastructure and compliance.mp4 (20.6 MB)
    • 08 - Distributed infrastructure and compliance.srt (13.8 KB)
    • 09 - Enterprise risk management, part 1.mp4 (13.8 MB)
    • 09 - Enterprise risk management, part 1.srt (10.9 KB)
    • 10 - Enterprise risk management, part 2.mp4 (15.8 MB)
    • 10 - Enterprise risk management, part 2.srt (11.4 KB)
    • 11 - Outsourcing and cloud contracts.mp4 (14.0 MB)
    • 11 - Outsourcing and cloud contracts.srt (10.4 KB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
R2-CACHE ☁️ R2 (hit) | CDN: MISS (0s) 📄 torrent 🕐 30 Dec 2025, 10:48:03 pm IST ⏰ 24 Jan 2026, 10:48:03 pm IST ✅ Valid for 7d 21h 🔄 Refresh Cache