CITATION

Thompson, Graham. CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide. New York: McGraw-Hill Education, 2020.

CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide

Published:  March 2020 Pages: 512

eISBN: 9781260460094 | ISBN: 9781260460087
  • Cover
  • About the Author
  • Title Page
  • Copyright Page
  • Dedication
  • Contents at a Glance
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Chapter 1 Cloud Computing Concepts and Architectures
  • Cloud Logical Model
  • Cloud Computing Definitions
  • Cloud Security Scope and the Shared Responsibility Model
  • Cloud Security Alliance Tools
  • Chapter Review
  • Chapter 2 Governance and Enterprise Risk Management
  • Governance
  • Risk Management
  • Cloud Risk Management
  • Chapter Review
  • Chapter 3 Legal Issues, Contracts, and Electronic Discovery
  • Legal Frameworks Governing Data Protection and Privacy
  • Regional Examples
  • Contracts and Provider Selection
  • Electronic Discovery
  • Chapter Review
  • Chapter 4 Compliance and Audit Management
  • Compliance Backgrounder
  • Impact of the Cloud on Contracts
  • How the Cloud Changes Compliance
  • Audit Backgrounder
  • Audit Management in the Cloud
  • SOC Reports and ISO Certifications Backgrounder
  • How the Cloud Changes Audits
  • Chapter Review
  • Chapter 5 Information Governance
  • Cloud Information Governance Domains
  • The Data Security Lifecycle
  • Chapter Review
  • Chapter 6 Management Plane and Business Continuity
  • Management Plane
  • Business Continuity and Disaster Recovery in the Cloud
  • Chapter Review
  • Chapter 7 Infrastructure Security
  • Cloud Network Virtualization
  • How Security Changes with Cloud Networking
  • Cloud Compute and Workload Security
  • Chapter Review
  • Chapter 8 Virtualization and Containers
  • Major Virtualization Categories Relevant to Cloud Computing
  • Containers
  • Chapter Review
  • Chapter 9 Incident Response
  • Incident Response Lifecycle
  • How the Cloud Impacts Incident Response
  • Chapter Review
  • Chapter 10 Application Security
  • The SSDLC and Cloud Computing
  • Secure Design and Development
  • Secure Deployment
  • Secure Operations
  • How the Cloud Impacts Application Design and Architectures
  • The Rise and Role of DevOps
  • Chapter Review
  • Chapter 11 Data Security and Encryption
  • Data Security Controls
  • Cloud Data Storage Types
  • Managing Data Migrations to the Cloud
  • Securing Data in the Cloud
  • Data Security Architecture
  • Monitoring, Auditing, and Alerting
  • Additional Data Security Controls
  • Enforcing Lifecycle Management Security
  • Chapter Review
  • Chapter 12 Identity, Entitlement, and Access Management
  • How IAM Works in the Cloud
  • IAM Terms
  • IAM Standards
  • Managing Users and Identities for Cloud Computing
  • Authentication and Credentials
  • Entitlements and Access Management
  • Privileged User Management
  • Chapter Review
  • Chapter 13 Security as a Service
  • Potential Benefits and Concerns of SecaaS
  • Major Categories of SaaS Offerings
  • Chapter Review
  • Chapter 14 Related Technologies
  • Big Data
  • Internet of Things (IoT)
  • Mobile Computing
  • Serverless Computing
  • Chapter Review
  • Chapter 15 ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security
  • Security Benefits of Cloud
  • Top Security Risks
  • Five Key Legal Issues Common Across All Scenarios
  • Additional Items for the Exam
  • Underlying Vulnerability in Loss of Governance
  • Risks R.1–R.35 and Underlying Vulnerabilities
  • Chapter Review
  • Appendix A Cloud Computing Security Policy Examples
  • Cloud Security Policy: Centralized Example
  • Cloud Security Policy: Classification Example
  • Appendix B About the Online Content
  • System Requirements
  • Your Total Seminars Training Hub Account
  • Single User License Terms and Conditions
  • TotalTester Online
  • Technical Support
  • Glossary
  • Index