Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCAK - Annex with support material
Preparation
Overview of the program
How to use this course
Non Disclosure, Chatham House Rule, and your participation
Introduce yourself
Marketing collateral
Courseware provisioning
CCAK Participant Guide
Online through Adobe Connect, and how to find recordings
Study and background resources
STOP right NOW!
Chatbot for CCAK
During the program
Chapter 1: Cloud Governance
Chapter 1: your pre-work
Chapter 1: pre-work assignment submissions
Chapter 2: Cloud Compliance Program
Chapter 2: your pre-work
Chapter 2: pre-work assignment submissions
Chapter 3: Introducing CCM and CAIQ
Chapter 3: your pre-work
Chapter 3: pre-work assignment submissions
Chapter 4: A Threat Analysis Methodology for Cloud Using CCM
Chapter 5: Cloud Auditing
Chapter 6: Evaluating a Cloud Compliance Program
Chapter 7: CCM Auditing Guidelines
Chapter 8: Continuous Assurance and Compliance
Chapter 9: Security Trust Assurance and Risk (STAR) Program
Preliminaries, alternates and extras
About this section
A business story on governance
Failed governance - a US federal government example
YouTube channel ClubCloudComputing and more
A hybrid IT supply chain example (3:55)
Getting started in AWS: VM with some security controls (8:52)
CCMv4 and related tools
IT risk basics
Overview of IT risk management and audit
Some IAM resources
Cloud architecture for security
Hybrid cloud as a migration strategy
Devops CI/CD pipeline demo (4:23)
Security scaling with infra as code
API gateway products according to Gartner
Continuous Monitoring
Podcasts to listen to
Wrapping up
CCAK Mindmap
Exam preparation, procedures, and experiences
Continued further development and application
Teach online with
Chapter 4: A Threat Analysis Methodology for Cloud Using CCM
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock