ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size1.3 GB
- Uploaded Byfreecoursewb
- Downloads52
- Last checkedJul. 11th '25
- Date uploadedJul. 10th '25
- Seeders 10
- Leechers3
ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
https://WebToolTip.com
Released: 07/2025
Duration: 10h 2m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 1.28 GB
Level: Intermediate | Genre: eLearning | Language: English
The CCSP exam nstrates professionals have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud. This course helps you build the knowledge and understanding you need to take the exam successfully. Learn about cloud concepts, architecture, and design. Explore cloud data security, cloud platform, and infrastructure security. Deep dive into cloud application security and cloud security operations. Plus, build your understanding of legal, risk, and compliance.
This course was created by Cybrary. We are pleased to host this training in our library.
Files:
[ WebToolTip.com ] ISC2 Certified Cloud Security Professional (CCSP) Cert Prep- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 01 - Introduction
- 01 - Introduction to CCSP.mp4 (11.3 MB)
- 01 - Introduction to CCSP.srt (9.2 KB)
- 01 - Domain 1 overview.mp4 (2.2 MB)
- 01 - Domain 1 overview.srt (2.1 KB)
- 02 - Cloud computing definitions, roles, and responsibilities.mp4 (25.0 MB)
- 02 - Cloud computing definitions, roles, and responsibilities.srt (20.1 KB)
- 03 - Key cloud computing characteristics.mp4 (16.0 MB)
- 03 - Key cloud computing characteristics.srt (11.8 KB)
- 04 - Building block technologies.mp4 (13.0 MB)
- 04 - Building block technologies.srt (12.3 KB)
- 05 - Cloud activities, service capabilities and categories, and deployment models.mp4 (16.2 MB)
- 05 - Cloud activities, service capabilities and categories, and deployment models.srt (14.5 KB)
- 06 - Cloud shared considerations.mp4 (14.4 MB)
- 06 - Cloud shared considerations.srt (12.8 KB)
- 07 - Impact of related technologies.mp4 (21.7 MB)
- 07 - Impact of related technologies.srt (18.6 KB)
- 08 - Cryptography and key management.mp4 (6.9 MB)
- 08 - Cryptography and key management.srt (6.8 KB)
- 09 - Identity and access control.mp4 (10.3 MB)
- 09 - Identity and access control.srt (9.9 KB)
- 10 - Data and media sanitization.mp4 (6.8 MB)
- 10 - Data and media sanitization.srt (6.6 KB)
- 11 - Network security.mp4 (16.3 MB)
- 11 - Network security.srt (13.3 KB)
- 12 - Virtualization security.mp4 (17.1 MB)
- 12 - Virtualization security.srt (15.9 KB)
- 13 - Common threats.mp4 (7.5 MB)
- 13 - Common threats.srt (6.0 KB)
- 14 - Security hygiene.mp4 (12.1 MB)
- 14 - Security hygiene.srt (11.2 KB)
- 15 - Cloud secure data lifecycle.mp4 (6.9 MB)
- 15 - Cloud secure data lifecycle.srt (6.5 KB)
- 16 - Business continuity and disaster recovery in the cloud.mp4 (14.2 MB)
- 16 - Business continuity and disaster recovery in the cloud.srt (12.1 KB)
- 17 - Business impact analysis and functional security requirements.mp4 (16.1 MB)
- 17 - Business impact analysis and functional security requirements.srt (11.9 KB)
- 18 - Service model security considerations and cloud design patterns.mp4 (12.9 MB)
- 18 - Service model security considerations and cloud design patterns.srt (9.7 KB)
- 19 - DevOps security.mp4 (6.4 MB)
- 19 - DevOps security.srt (4.6 KB)
- 20 - Verifications and certifications using common standards.mp4 (13.8 MB)
- 20 - Verifications and certifications using common standards.srt (9.7 KB)
- 01 - Domain 2 overview.mp4 (1.4 MB)
- 01 - Domain 2 overview.srt (1.2 KB)
- 02 - Cloud data life cycle, data dispersion, and data flows.mp4 (14.7 MB)
- 02 - Cloud data life cycle, data dispersion, and data flows.srt (14.3 KB)
- 03 - Storage types.mp4 (20.9 MB)
- 03 - Storage types.srt (15.4 KB)
- 04 - Storage threats.mp4 (15.2 MB)
- 04 - Storage threats.srt (12.0 KB)
- 05 - Encryption and key management.mp4 (25.3 MB)
- 05 - Encryption and key management.srt (17.4 KB)
- 06 - Hashing, data obfuscation, and tokenization.mp4 (18.8 MB)
- 06 - Hashing, data obfuscation, and tokenization.srt (16.1 KB)
- 07 - Data loss prevention, keys, secrets, and certificates.mp4 (21.4 MB)
- 07 - Data loss prevention, keys, secrets, and certificates.srt (16.6 KB)
- 08 - Different structures of data and data location.mp4 (14.1 MB)
- 08 - Different structures of data and data location.srt (12.7 KB)
- 09 - Data classification policies.mp4 (9.4 MB)
- 09 - Data classification policies.srt (8.5 KB)
- 10 - Data mapping and labeling.mp4 (7.6 MB)
- 10 - Data mapping and labeling.srt (7.5 KB)
- 11 - Information rights management.mp4 (12.8 MB)
- 11 - Information rights management.srt (11.1 KB)
- 12 - Data retention policies.mp4 (15.7 MB)
- 12 - Data retention policies.srt (13.7 KB)
- 13 - Data deletion, archiving, and legal hold.mp4 (16.6 MB)
- 13 - Data deletion, archiving, and legal hold.srt (11.3 KB)
- 14 - Enable data audit, trace, and accountability.mp4 (16.6 MB)
- 14 - Enable data audit, trace, and accountability.srt (12.7 KB)
- 01 - Domain 3 overview.mp4 (1.6 MB)
- 02 - Physical environment.mp4 (10.2 MB)
- 02 - Physical environment.srt (7.6 KB)
- 03 - Network communications and computing.mp4 (9.7 MB)
- 04 - Virtualization.mp4 (13.0 MB)
- 04 - Virtualization.srt (11.5 KB)
- 05 - Storage.mp4 (8.3 MB)
- 05 - Storage.srt (7.3 KB)
- 06 - Management plane.mp4 (13.6 MB)
- 06 - Management plane.srt (11.4 KB)
- 07 - Design a secure data center.mp4 (21.3 MB)
- 07 - Design a secure data center.srt (16.3 KB)
- 08 - Risk analysis.mp4 (9.6 MB)
- 08 - Risk analysis.srt (7.8 KB)
- 09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.mp4 (12.5 MB)
- 09 - Cloud vulnerabilities, threats, attacks, and risk mitigation.srt (11.2 KB)
- 10 - Physical and environmental protection.mp4 (9.4 MB)
- 11 - System, storage, and communication protection.mp4 (5.9 MB)
- 11 - System, storage, and communication protection.srt (4.8 KB)
- 12 - Identification, authentication, and authorization in the cloud.mp4 (13.8 MB)
- 12 - Identification, authentication, and authorization in the cloud.srt (10.5 KB)
- 13 - Audit mechanisms.mp4 (14.7 MB)
- 13 - Audit mechanisms.srt (10.9 KB)
- 14 - Business continuity (BC) and disaster recovery (DR) strategies.mp4 (8.2 MB)
- 14 - Business continuity (BC) and disaster recovery (DR) strategies.srt (6.5 KB)
- 15 - Business requirements.mp4 (11.8 MB)
- 16 - BC and DR planning and testing.mp4 (17.1 MB)
- 16 - BC and DR planning and testing.srt (11.6 KB)
-
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce