Atjaunināt sīkdatņu piekrišanu

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition 2nd edition [Mīkstie vāki]

3.98/5 (50 ratings by Goodreads)
  • Formāts: Paperback / softback, 448 pages, weight: 644 g, 60 Illustrations
  • Izdošanas datums: 11-Dec-2019
  • Izdevniecība: McGraw-Hill Education
  • ISBN-10: 1260456927
  • ISBN-13: 9781260456929
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 65,54 €*
  • * Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
  • Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena.
  • Daudzums:
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 448 pages, weight: 644 g, 60 Illustrations
  • Izdošanas datums: 11-Dec-2019
  • Izdevniecība: McGraw-Hill Education
  • ISBN-10: 1260456927
  • ISBN-13: 9781260456929
Citas grāmatas par šo tēmu:
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam

Thoroughly revised for the 2019 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge, as established both by CSA and the (ISC)2. The book offers clear explanations of every subject on the brand-new CCSP exam and features accurate practice questions and real-world examples.

Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Second Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. “Notes,” “Tips,” and “Cautions” throughout provide insight and call out potentially harmful situations.

•All practice questions match the tone, content, and format of those on the actual exam
•Electronic content includes 300+ practice questions 
•Written by an IT security expert with 20 years of experience

Introduction xiv
Acknowledgments xv
Chapter 1 How to Obtain the CCSP and Introduction to Security
1(16)
Why Get Certified?
1(1)
How to Get Certified
2(1)
CCSP Domains
2(8)
Domain 1 Cloud Concepts, Architecture, and Design
3(1)
Domain 2 Cloud Data Security
4(2)
Domain 3 Cloud Platform and Infrastructure Security
6(1)
Domain 4 Cloud Application Security
7(1)
Domain 5 Cloud Security Operations
8(1)
Domain 6 Legal, Risk, and Compliance
9(1)
Introduction to IT Security
10(6)
Basic Security Concepts
10(5)
Risk Management
15(1)
Business Continuity and Disaster Recovery
16(1)
Chapter Review
16(1)
Chapter 2 Cloud Concepts, Architecture, and Design
17(64)
Cloud Computing Concepts
18(5)
Cloud Computing Definitions
18(1)
Cloud Computing Roles
19(1)
Key Cloud Computing Characteristics
20(3)
Building-Block Technologies
23(1)
Cloud Reference Architecture
23(1)
Cloud Computing Activities
23(17)
Cloud Service Capabilities
24(1)
Cloud Service Categories
24(5)
Cloud Deployment Models
29(3)
Cloud Shared Considerations
32(4)
Impact of Related Technologies
36(4)
Security Concepts Relevant to Cloud Computing
40(18)
Cryptography
40(3)
Access Control
43(3)
Data and Media Sanitation
46(1)
Network Security
47(1)
Virtualization Security
48(1)
Common Threats
49(4)
Security Considerations for the Different Cloud Categories
53(5)
Design Principles of Secure Cloud Computing
58(4)
Cloud Secure Data Lifecycle
58(1)
Cloud-Based Business Continuity/Disaster Recovery Planning
59(1)
Cost-Benefit Analysis
60(2)
Identify Trusted Cloud Services
62(5)
Certification Against Criteria
62(1)
System/Subsystem Product Certifications
62(5)
Cloud Architecture Models
67(2)
Sherwood Applied Business Security Architecture (SABSA)
68(1)
IT Infrastructure Library (ITIL)
68(1)
The Open Group Architecture Framework (TOGAF)
68(1)
NIST Cloud Technology Roadmap
69(1)
Exercise
69(1)
Chapter Review
69(12)
Questions
70(3)
Questions and Answers
73(8)
Chapter 3 Cloud Data Security
81(48)
Describe Cloud Data Concepts
81(3)
Cloud Data Lifecycle Phases
81(3)
Data Dispersion
84(1)
Design and Implement Cloud Data Storage Architectures
84(3)
Storage Types
84(2)
Threats to Storage Types
86(1)
Design and Apply Data Security Strategies
87(9)
Encryption
87(2)
Hashing
89(1)
Key Management
89(2)
Tokenization
91(1)
Data Loss Prevention
91(2)
Data De-identification
93(1)
Application of Technologies
94(1)
Emerging Technologies
95(1)
Implement Data Discovery
96(1)
Structured Data
97(1)
Unstructured Data
97(1)
Implement Data Classification
97(3)
Mapping
98(1)
Labeling
99(1)
Sensitive Data
99(1)
Relevant Jurisdictional Data Protections for Personally Identifiable Information
100(4)
Data Privacy Acts
100(1)
Privacy Roles and Responsibilities
101(1)
Implementation of Data Discovery
102(1)
Classification of Discovered Sensitive Data
102(1)
Mapping and Definition of Controls
103(1)
Application of Defined Controls
103(1)
Data Rights Management
104(2)
Data Rights Objectives
104(1)
Tools
105(1)
Data Retention, Deletion, and Archiving Policies
106(4)
Data Retention
106(1)
Data Deletion
107(1)
Data Archiving
107(2)
Legal Hold
109(1)
Auditability, Traceability, and Accountability of Data Events
110(9)
Definition of Event Sources
110(2)
Identity Attribution Requirements
112(2)
Data Event Logging
114(1)
Storage and Analysis of Data Events
115(2)
Continuous Optimizations
117(1)
Chain of Custody and Nonrepudiation
118(1)
Exercise
119(1)
Chapter Review
119(10)
Questions
120(2)
Questions and Answers
122(7)
Chapter 4 Cloud Platform and Infrastructure Security
129(36)
Comprehend Cloud Infrastructure Components
129(7)
Physical Environment
129(2)
Network and Communications
131(1)
Compute
132(1)
Storage
133(1)
Virtualization
134(1)
Management Plane
135(1)
Analyze Risks Associated with Cloud Infrastructure
136(3)
Risk Assessment and Analysis
136(1)
Virtualization Risks
137(2)
Countermeasure Strategies
139(1)
Design and Plan Security Controls
139(8)
Physical and Environmental Protection
139(1)
System and Communication Protection
140(1)
Virtualization Systems Protection
141(1)
Identification, Authentication, and Authorization in a Cloud Infrastructure
142(3)
Audit Mechanisms
145(2)
Disaster Recovery and Business Continuity Management Planning
147(8)
Understanding the Cloud Environment
147(1)
Understanding Business Requirements
148(1)
Understanding Risks
149(2)
Disaster Recovery/Business Continuity Strategy
151(4)
Exercise
155(1)
Chapter Review
155(10)
Questions
155(3)
Questions and Answers
158(7)
Chapter 5 Cloud Application Security
165(34)
Advocate Training and Awareness for Application Security
165(3)
Cloud Development Basics
166(1)
Common Pitfalls
166(2)
Describe the Secure Software Development Lifecycle (SDLC) Process
168(2)
Business Requirements
168(1)
Phases and Methodologies
168(2)
Apply the Secure Software Development Lifecycle
170(10)
Avoid Common Vulnerabilities During Development
171(3)
Cloud-Specific Risks
174(2)
Quality of Service
176(1)
Threat Modeling
176(3)
Software Configuration Management and Versioning
179(1)
Cloud Software Assurance and Validation
180(2)
Cloud-Based Functional Testing
180(1)
Cloud Secure Development Lifecycle (CSDLC)
180(1)
Security Testing
181(1)
Verified Secure Software
182(1)
Approved API
182(1)
Supply-Chain Management
182(1)
Community Knowledge
183(1)
Cloud Application Architecture
183(4)
Supplemental Security Devices
184(1)
Cryptography
185(1)
Sandboxing
186(1)
Application Visualization
186(1)
Identity and Access Management (IAM) Solutions
187(4)
Federated Identity
188(1)
Identity Providers
189(1)
Single Sign-On
190(1)
Multifactor Authentication
190(1)
Exercise
191(1)
Chapter Review
191(8)
Questions
192(2)
Questions and Answers
194(5)
Chapter 6 Cloud Security Operations
199(52)
Support the Planning Process for the Data Center Design
199(7)
Logical Design
200(1)
Physical Design
201(4)
Environmental Design
205(1)
Implement and Build the Physical Infrastructure for the Cloud Environment
206(6)
Secure Configuration of Hardware-Specific Requirements
206(4)
Installation and Configuration of Virtualization Management Tools
210(1)
Virtual Hardware Specific Security Configuration Requirements
211(1)
Installation of Guest Operating System Virtualization Toolsets
212(1)
Operate the Physical and Logical Infrastructure for the Cloud Environment
212(9)
Configuration of Access Control for Local and Remote Access
213(1)
Secure Network Configuration
214(4)
OS Hardening via Application of Baselines
218(1)
Availability of Standalone Hosts
219(1)
Availability of Clustered Hosts
219(2)
Availability of the Guest Operating System
221(1)
Manage the Physical and Logical Infrastructure for Cloud Environment
221(11)
Access Controls for Remote Access
221(1)
OS Baseline Compliance Monitoring and Remediation
222(1)
Patch Management
223(2)
Performance Monitoring
225(1)
Hardware Monitoring
226(1)
Backup and Restore Functions
226(1)
Network Security Controls
227(4)
Management Plan
231(1)
Implement Operational Controls and Standards
232(6)
Change Management
233(1)
Continuity Management
234(1)
Information Security Management
235(1)
Continual Service Improvement Management
235(1)
Incident Management
235(1)
Problem Management
236(1)
Release and Deployment Management
237(1)
Configuration Management
237(1)
Service Level Management
237(1)
Availability Management
238(1)
Capacity Management
238(1)
Support Digital Forensics
238(2)
Proper Methodologies for the Forensic Collection of Data
238(2)
Evidence Management
240(1)
Manage Communication with Relevant Parties
240(2)
Vendors
240(1)
Customers
241(1)
Partners
241(1)
Regulators
241(1)
Other Stakeholders
242(1)
Manage Security Operations
242(2)
Security Operations Center
242(1)
Monitoring of Security Controls
242(1)
Log Capture and Analysis
242(2)
Exercise
244(1)
Chapter Review
244(7)
Questions
245(2)
Questions and Answers
247(4)
Chapter 7 Legal, Risk, and Compliance
251(39)
Articulate Legal Requirements and Unique Risks Within the Cloud Environment
251(7)
Conflicting International Legislation
251(1)
Evaluation of Legal Risks Specific to Cloud Computing
252(1)
Legal Framework and Guidelines
253(1)
eDiscovery
253(4)
Forensics Requirements
257(1)
Understand Privacy Issues
258(8)
Difference Between Contractual and Regulated Personally Identifiable Information (PII)
258(1)
Country-Specific Legislation Related to PII and Data Privacy
259(2)
Differences Among Confidentiality, Integrity, Availability, and Privacy
261(3)
Standard Privacy Requirements
264(2)
Understand Audit Processes, Methodologies, and Required Adaptations for a Cloud Environment
266(17)
Internal and External Audit Controls
266(1)
Impact of Audit Requirements
266(1)
Identify Assurance Challenges of Virtualization and Cloud
267(1)
Types of Audit Reports
267(4)
Restrictions of Audit Scope Statements
271(2)
Gap Analysis
273(1)
Audit Planning
273(5)
Internal Information Security Management System (ISMS)
278(1)
Internal Information Security Controls System
279(1)
Policies
280(1)
Identification and Involvement of Relevant Stakeholders
280(1)
Specialized Compliance Requirements for Highly Regulated Industries
281(1)
Impact of Distributed IT Model
281(2)
Understand Implications of Cloud to Enterprise Risk Management
283(1)
Assess Provider's Risk Management
283(1)
Difference Between Data Owner/Controller vs. Data Custodian/Processor
283(1)
Risk Treatment
284(4)
Different Risk Frameworks
288(1)
Metrics for Risk Management
289(1)
Assessment of the Risk Environment
289(1)
Understand Outsourcing and Cloud Contract Design
290(5)
Business Requirements
290(1)
Vendor Management
291(2)
Contract Management
293(2)
Executive Vendor Management
295(1)
Supply-Chain Management
295(1)
Exercise
295(1)
Chapter Review
296(7)
Questions
296(2)
Questions and Answers
298(5)
Appendix A Exam Review Questions
303(92)
Questions
303(19)
Quick Answers
322(1)
Questions and Comprehensive Answer Explanations
323(72)
Appendix B About the Online Content
395(4)
System Requirements
395(1)
Your Total Seminars Training Hub Account
395(1)
Privacy Notice
395(1)
Single User License Terms and Conditions
395(2)
TotalTester Online
397(1)
Technical Support
397(2)
Glossary 399(14)
Index 413