Enterprise Cloud Security With Ccsp - Part 1 : Foundations

Posted By: ELK1nG

Enterprise Cloud Security With Ccsp - Part 1 : Foundations
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.42 GB | Duration: 6h 21m

Master Cloud Architecture & Data Security | CCSP Domains 1 & 2 | Learn cloud models, data lifecycle, encryption, design

What you'll learn

Understand the Core Domains of CCSP Gain comprehensive knowledge across (ISC)² CCSP domains

Apply Cloud Security Concepts in Real-World Scenarios Learn to design, manage, and secure cloud infrastructure

Prepare for the (ISC)² CCSP Certification Exam with Confidence test-taking strategies, and key concepts

Evaluate and Improve Enterprise Cloud Security Posture Develop the ability to Assess organizational cloud security maturity

Requirements

Basic understanding of cybersecurity principles Familiarity with fundamental security concepts such as confidentiality, integrity, availability (CIA), access controls, and network security is recommended.

Experience in IT or Information Security (1–2 years preferred) Although not mandatory, having hands-on experience in cloud services, IT infrastructure, or security operations will help learners grasp advanced CCSP topics more effectively.

Familiarity with Cloud Computing Models (IaaS, PaaS, SaaS) A general awareness of how cloud platforms function (e.g., AWS, Azure, Google Cloud) will enhance your learning, but all essential concepts will be explained in the course.

No Specific Tools or Software Required You do not need to install any tools or platforms. This course is theory-rich and aligned with the CCSP exam, with additional real-world context and examples.

Description

Embark on your journey to becoming a Certified Cloud Security Professional (CCSP) with this focused and comprehensive course covering Domains 1 and 2 of the (ISC)² CCSP certification exam.In this first installment of the CCSP series, we deep dive into Cloud Concepts, Architecture and Design and Cloud Data Security—two of the most foundational and critical domains in cloud security. Whether you're an IT professional, a security architect, or a cloud engineer, this course will provide you with the knowledge and confidence to understand cloud infrastructure, its security challenges, and the data protection strategies essential for today’s dynamic cloud environments.You will explore cloud service models (IaaS, PaaS, SaaS), deployment architectures (public, private, hybrid, community), and cloud reference architectures such as NIST and ISO frameworks. We’ll also cover key aspects of secure cloud design principles, data classification, data lifecycle phases, encryption methods, tokenization, and cloud-based key management solutions.Each topic is explained clearly with real-world examples, exam-aligned concepts, and visual aids to strengthen your understanding. This course is ideal for those pursuing the CCSP certification or looking to deepen their cloud security expertise.As part of a three-course series, this course sets the stage for deeper mastery of cloud infrastructure, applications, and compliance topics in upcoming modules. By completing this first part, you'll not only cover essential exam content but also gain practical insight that you can apply immediately in your organization’s cloud initiatives.Join now and build a strong foundation in cloud security—one domain at a time.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 About edZconsult

Lecture 3 The Exam

Section 2: Domain 1 : Cloud Concepts, Architecture and Design

Lecture 4 Domain 1 - Introduction

Lecture 5 Domain 1 - Module 1 : Understanding Cloud Computing Concepts

Lecture 6 Domain 1 - Module 1 : Cloud Computing Essentials

Lecture 7 Domain 1 - Module 1 : Deployment Models - Building Block Technologies

Lecture 8 Domain 1 - Module 2 : Cloud Reference Architecture

Lecture 9 Domain 1 - Module 2 : Cloud Computing Activities

Lecture 10 Domain 1 - Module 2 : Cloud Service Capabilities

Lecture 11 Domain 1 - Module 2 : Cloud Deployment Models

Lecture 12 Domain 1 - Module 2 : Cloud Shared Considerations

Lecture 13 Domain 1 - Module 2 : Impact of Related Technologies

Lecture 14 Domain 1 - Module 3 : Security Concepts Relevant to Cloud Computing

Lecture 15 Domain 1 - Module 3 : Crypto Key Management

Lecture 16 Domain 1 - Module 3 : Identity and Access Control

Lecture 17 Domain 1 - Module 3 : Data Sanitization

Lecture 18 Domain 1 - Module 3 : Network and Virtualization Security

Lecture 19 Domain 1 - Module 3 : Common Threats

Lecture 20 Domain 1 - Module 3 : Security Hygiene

Lecture 21 Domain 1 - Module 4 : Design Principles of Secure Cloud Computing

Lecture 22 Domain 1 - Module 4 : Cloud Secure Data Lifecycle

Lecture 23 Domain 1 - Module 4 : Business Impact Analysis

Lecture 24 Domain 1 - Module 4 : Functional Security Requirements

Lecture 25 Domain 1 - Module 4 : Security Considerations and Responsibilities

Lecture 26 Domain 1 - Module 4 : Cloud Design Patterns

Lecture 27 Domain 1 - Module 4 : Devops Security

Lecture 28 Domain 1 - Module 5 : Evaluation of CSPs

Lecture 29 Domain 1 - Module 5 : Verification Against Criteria

Lecture 30 Domain 1 - Module 5 : Product Certification

Section 3: Domain 2 : Cloud Concepts, Architecture and Design

Lecture 31 Domain 2 - Introduction

Lecture 32 Domain 2 - Module 1 : Cloud Data Concepts

Lecture 33 Domain 2 - Module 1 : Cloud Data Life Cycle Phases

Lecture 34 Domain 2 - Module 1 : Data Dispersion

Lecture 35 Domain 2 - Module 1 : Data Flows

Lecture 36 Domain 2 - Module 2 : Design and Implement Cloud Data Storage Architectures

Lecture 37 Domain 2 - Module 2 : Cloud Storage Types

Lecture 38 Domain 2 - Module 3 : Data Security Technologies and Strategies

Lecture 39 Domain 2 - Module 3 : Encryption and Key Management

Lecture 40 Domain 2 - Module 3 : Integrated Encryption and Key Management

Lecture 41 Domain 2 - Module 3 : Hashing

Lecture 42 Domain 2 - Module 3 : Data Obfuscation

Lecture 43 Domain 2 - Module 3 : Tokenization

Lecture 44 Domain 2 - Module 3 : Data Loss Prevention

Lecture 45 Domain 2 - Module 4 : Implementing Data Discovery

Lecture 46 Domain 2 - Module 4 : Structured Data

Lecture 47 Domain 2 - Module 4 : Unstructured Data

Lecture 48 Domain 2 - Module 4 : Semi-Structured Data

Lecture 49 Domain 2 - Module 4 : Data Location

Lecture 50 Domain 2 - Module 5 : Implementing Data Classification

Lecture 51 Domain 2 - Module 5 : Data Classificaion Policies

Lecture 52 Domain 2 - Module 5 : Data Mapping

Lecture 53 Domain 2 - Module 5 : Data Labeling

Lecture 54 Domain 2 - Module 6 : Information Rights Management

Lecture 55 Domain 2 - Module 6 : IRM Objectives

Lecture 56 Domain 2 - Module 6 : IRM Tools

Lecture 57 Domain 2 - Module 7 : Data Retention, Deletion and Archiving

Lecture 58 Domain 2 - Module 7 : Data Retention Policies

Lecture 59 Domain 2 - Module 7 : Data Retention Policies - 2

Lecture 60 Domain 2 - Module 7 : Data Retention Policies - 3

Lecture 61 Domain 2 - Module 7 : Data Deletion

Lecture 62 Domain 2 - Module 7 : Legal Hold

Lecture 63 Domain 2 - Module 8 : Data Events Auditability

Lecture 64 Domain 2 - Module 8 : Event Sources and Attributes

Lecture 65 Domain 2 - Module 8 : Logging and Analysis of Data Events

Lecture 66 Domain 2 - Module 8 : Chain of Custody

IT and Security Professionals who want to advance their careers by earning the globally recognized (ISC)² CCSP certification.,Cloud Architects, Engineers, and Consultants looking to validate their knowledge of cloud security design, governance, and operations.,CISSP or Security+ Certified Professionals preparing to specialize in cloud security with a focus on compliance, risk, and technical controls.,Enterprise Security Leaders and Managers who need to understand how to manage cloud risks, vendor contracts, and legal/regulatory issues in a cloud-first organization.,Anyone preparing for the (ISC)² CCSP exam and seeking a structured, complete, and practical learning path with real-world context.