Autoplay
Autocomplete
Previous Lesson
Complete and Continue
V3 Cloud and Security Architecture
Preparation
Welcome to Cloud and Security Architecture
Meet your instructor (1:46)
Initial survey: where do you come from, where do you want to go?
CSA Cloud Security Guidance document
ENISA Cloud Computing Security Risk Assessment
CCSK by section and by domain
Lab: Introduction to labs
Lab: Set up your AWS account (Ref 1)
Understand public and private keys
Lab: Download Putty and PuttyGen, the terminal emulator for Windows
Lab: Generate keypair with Puttygen (Ref 2)
Lab: Generate keypair on AWS (Ref 3)
Lab: Generate keypair on Mac or Linux (Ref 4)
Your goals on paper
Tips for improving the sound quality of webinars
5 day online program
Cloud Security 101
Day 1 starting up
Classroom training - Pitch your neighbour
Virtual classroom - Introduction into the daily CCSK sessions
Day 1 Section 1 Introduction and Architecture
Cloud Computing is changing your job
The AWS story
What is cloud computing? Essential characteristics.
Service models
Exercise: Service models
Deployment and private cloud
AWS Isolation features drilldown (3:48)
Hybrid cloud
Cloud brokers (and the business model canvas)
Jericho and other reference models
Summary CCSK Domain 1 Architecture
Quiz CCSK Domain 1
More Domain 1 Quiz questions
Reading guide section 1
CCSK Official Module 1
Section 2 Infrastructure
Cloud infrastructure
Cloud Saas/Paas architecture
Lab preparation: Public cloud provider overview
Demo video: getting started on AWS (8:53)
Lab: Create the first instance on AWS (Ref 5)
Lab: Log in to server (Ref 7)
Lab: Protect the management console (Ref 10)
Lab: What is happening on my server? (Ref 15)
Summary Domain 13 Virtualization
Summary Domain 7 Business continuity
Summary Domain 8: Data Center
Exercise: your first three steps in cloud adoption
Quiz questions section 2
Midway survey
Reading guide section 2
Lab: Create multiple AWS users (Ref 11)
Section 2 Extra material beyond CCSK exam
Demo and Lab exercise: OpenStack
Virtualization vulnerabilities and attacks
Virtualization risks from NIST
OpenStack Security Guide
Software defined networking
The cloud market
Cloud concepts reference documents
Security best practices for AWS
Section 3 Risk and Process
Risk and IT security
Data Security
Summary Domain 5 Data security
Interoperability and Portability
Summary Domain 6 Interoperability
Lab: API management with Zapier (Ref 31)
Incident response
Summary Domain 9 Incident Response
ENISA top risks
Summary ENISA
Quiz questions section 3
Reading guide section 3
Section 3 Extra material beyond CCSK exam
Extra: Incident response resources
Data Security resources
Section 4 Application Software
Encryption and key management
Summary Domain 11 Encryption
Application security
Summary Domain 10 Application security
Federated Identity Management
PEP, PDP and XACML
Summary Domain 12 IAM
Lab: federated identity management (Ref 60)
Security as a Service
Summary Domain 14 SecaaS
Quiz questions section 4
Reading guide section 4
Section 4 Extra material beyond CCSK exam
More on identity management
Encryption (key) management steps
A sketch of the continous deployment toolchain
Security in the software supply chain
Lab: Continuous delivery (Ref 35)
Section 5 Governance
Governance and enterprise risk management
Service Agreements
Summary Domain 2 Governance
Legal and Electronic Discovery
Summary Domain 3 Legal
Audit and Compliance
Summary Domain 4 Audit and Compliance
ENISA summary of 35 risks
Private cloud example: solvency
Exercise Cloud Risk Triage
Quiz questions section 5
Reading guide section 5
Lab: State of cloud (Ref 70)
Section 5 Extra material beyond CCSK exam
Business reasons for cloud computing
Cloud migration strategies and their impact on security and governance
Data protection in the EU (1:21)
Extra: background on data processor responsibilities
Cloud procurement in the value chain
CAIQ CCM excerpt for CCSK training (73:16)
CSA Security, Trust & Assurance Registry (STAR)
Talking to the board about security (6:06)
Service Agreements - revisited
How the NSA hacks you and what you can do about it
Amazon's best practices papers
A bit of fun: How to get your organization ISO 27001 certified in one day
A repeatable cloud migration process model
Wrap up and exam preparation
Wrapping up: reviewing the course
Exam preparation guide
ENISA Study guide
Abbreviations
Official CCSK exam preparation guide
CCSK sample questions from CSA
Answer key questions
As you do the exam
After your cloud and security architecture course
More research done by the CSA
CCSK versus CCSP
Teach online with
Cloud infrastructure
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock