Enterprise Cloud Security With Ccsp - Part 1 : Foundations
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.42 GB | Duration: 6h 21m
Published 7/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.42 GB | Duration: 6h 21m
Master Cloud Architecture & Data Security | CCSP Domains 1 & 2 | Learn cloud models, data lifecycle, encryption, design
What you'll learn
Understand the Core Domains of CCSP Gain comprehensive knowledge across (ISC)² CCSP domains
Apply Cloud Security Concepts in Real-World Scenarios Learn to design, manage, and secure cloud infrastructure
Prepare for the (ISC)² CCSP Certification Exam with Confidence test-taking strategies, and key concepts
Evaluate and Improve Enterprise Cloud Security Posture Develop the ability to Assess organizational cloud security maturity
Requirements
Basic understanding of cybersecurity principles Familiarity with fundamental security concepts such as confidentiality, integrity, availability (CIA), access controls, and network security is recommended.
Experience in IT or Information Security (1–2 years preferred) Although not mandatory, having hands-on experience in cloud services, IT infrastructure, or security operations will help learners grasp advanced CCSP topics more effectively.
Familiarity with Cloud Computing Models (IaaS, PaaS, SaaS) A general awareness of how cloud platforms function (e.g., AWS, Azure, Google Cloud) will enhance your learning, but all essential concepts will be explained in the course.
No Specific Tools or Software Required You do not need to install any tools or platforms. This course is theory-rich and aligned with the CCSP exam, with additional real-world context and examples.
Description
Embark on your journey to becoming a Certified Cloud Security Professional (CCSP) with this focused and comprehensive course covering Domains 1 and 2 of the (ISC)² CCSP certification exam.In this first installment of the CCSP series, we deep dive into Cloud Concepts, Architecture and Design and Cloud Data Security—two of the most foundational and critical domains in cloud security. Whether you're an IT professional, a security architect, or a cloud engineer, this course will provide you with the knowledge and confidence to understand cloud infrastructure, its security challenges, and the data protection strategies essential for today’s dynamic cloud environments.You will explore cloud service models (IaaS, PaaS, SaaS), deployment architectures (public, private, hybrid, community), and cloud reference architectures such as NIST and ISO frameworks. We’ll also cover key aspects of secure cloud design principles, data classification, data lifecycle phases, encryption methods, tokenization, and cloud-based key management solutions.Each topic is explained clearly with real-world examples, exam-aligned concepts, and visual aids to strengthen your understanding. This course is ideal for those pursuing the CCSP certification or looking to deepen their cloud security expertise.As part of a three-course series, this course sets the stage for deeper mastery of cloud infrastructure, applications, and compliance topics in upcoming modules. By completing this first part, you'll not only cover essential exam content but also gain practical insight that you can apply immediately in your organization’s cloud initiatives.Join now and build a strong foundation in cloud security—one domain at a time.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 About edZconsult
Lecture 3 The Exam
Section 2: Domain 1 : Cloud Concepts, Architecture and Design
Lecture 4 Domain 1 - Introduction
Lecture 5 Domain 1 - Module 1 : Understanding Cloud Computing Concepts
Lecture 6 Domain 1 - Module 1 : Cloud Computing Essentials
Lecture 7 Domain 1 - Module 1 : Deployment Models - Building Block Technologies
Lecture 8 Domain 1 - Module 2 : Cloud Reference Architecture
Lecture 9 Domain 1 - Module 2 : Cloud Computing Activities
Lecture 10 Domain 1 - Module 2 : Cloud Service Capabilities
Lecture 11 Domain 1 - Module 2 : Cloud Deployment Models
Lecture 12 Domain 1 - Module 2 : Cloud Shared Considerations
Lecture 13 Domain 1 - Module 2 : Impact of Related Technologies
Lecture 14 Domain 1 - Module 3 : Security Concepts Relevant to Cloud Computing
Lecture 15 Domain 1 - Module 3 : Crypto Key Management
Lecture 16 Domain 1 - Module 3 : Identity and Access Control
Lecture 17 Domain 1 - Module 3 : Data Sanitization
Lecture 18 Domain 1 - Module 3 : Network and Virtualization Security
Lecture 19 Domain 1 - Module 3 : Common Threats
Lecture 20 Domain 1 - Module 3 : Security Hygiene
Lecture 21 Domain 1 - Module 4 : Design Principles of Secure Cloud Computing
Lecture 22 Domain 1 - Module 4 : Cloud Secure Data Lifecycle
Lecture 23 Domain 1 - Module 4 : Business Impact Analysis
Lecture 24 Domain 1 - Module 4 : Functional Security Requirements
Lecture 25 Domain 1 - Module 4 : Security Considerations and Responsibilities
Lecture 26 Domain 1 - Module 4 : Cloud Design Patterns
Lecture 27 Domain 1 - Module 4 : Devops Security
Lecture 28 Domain 1 - Module 5 : Evaluation of CSPs
Lecture 29 Domain 1 - Module 5 : Verification Against Criteria
Lecture 30 Domain 1 - Module 5 : Product Certification
Section 3: Domain 2 : Cloud Concepts, Architecture and Design
Lecture 31 Domain 2 - Introduction
Lecture 32 Domain 2 - Module 1 : Cloud Data Concepts
Lecture 33 Domain 2 - Module 1 : Cloud Data Life Cycle Phases
Lecture 34 Domain 2 - Module 1 : Data Dispersion
Lecture 35 Domain 2 - Module 1 : Data Flows
Lecture 36 Domain 2 - Module 2 : Design and Implement Cloud Data Storage Architectures
Lecture 37 Domain 2 - Module 2 : Cloud Storage Types
Lecture 38 Domain 2 - Module 3 : Data Security Technologies and Strategies
Lecture 39 Domain 2 - Module 3 : Encryption and Key Management
Lecture 40 Domain 2 - Module 3 : Integrated Encryption and Key Management
Lecture 41 Domain 2 - Module 3 : Hashing
Lecture 42 Domain 2 - Module 3 : Data Obfuscation
Lecture 43 Domain 2 - Module 3 : Tokenization
Lecture 44 Domain 2 - Module 3 : Data Loss Prevention
Lecture 45 Domain 2 - Module 4 : Implementing Data Discovery
Lecture 46 Domain 2 - Module 4 : Structured Data
Lecture 47 Domain 2 - Module 4 : Unstructured Data
Lecture 48 Domain 2 - Module 4 : Semi-Structured Data
Lecture 49 Domain 2 - Module 4 : Data Location
Lecture 50 Domain 2 - Module 5 : Implementing Data Classification
Lecture 51 Domain 2 - Module 5 : Data Classificaion Policies
Lecture 52 Domain 2 - Module 5 : Data Mapping
Lecture 53 Domain 2 - Module 5 : Data Labeling
Lecture 54 Domain 2 - Module 6 : Information Rights Management
Lecture 55 Domain 2 - Module 6 : IRM Objectives
Lecture 56 Domain 2 - Module 6 : IRM Tools
Lecture 57 Domain 2 - Module 7 : Data Retention, Deletion and Archiving
Lecture 58 Domain 2 - Module 7 : Data Retention Policies
Lecture 59 Domain 2 - Module 7 : Data Retention Policies - 2
Lecture 60 Domain 2 - Module 7 : Data Retention Policies - 3
Lecture 61 Domain 2 - Module 7 : Data Deletion
Lecture 62 Domain 2 - Module 7 : Legal Hold
Lecture 63 Domain 2 - Module 8 : Data Events Auditability
Lecture 64 Domain 2 - Module 8 : Event Sources and Attributes
Lecture 65 Domain 2 - Module 8 : Logging and Analysis of Data Events
Lecture 66 Domain 2 - Module 8 : Chain of Custody
IT and Security Professionals who want to advance their careers by earning the globally recognized (ISC)² CCSP certification.,Cloud Architects, Engineers, and Consultants looking to validate their knowledge of cloud security design, governance, and operations.,CISSP or Security+ Certified Professionals preparing to specialize in cloud security with a focus on compliance, risk, and technical controls.,Enterprise Security Leaders and Managers who need to understand how to manage cloud risks, vendor contracts, and legal/regulatory issues in a cloud-first organization.,Anyone preparing for the (ISC)² CCSP exam and seeking a structured, complete, and practical learning path with real-world context.