Section 1 : Welcome
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | About Certification | |
|
Lecture 3 | About Proctor Testing |
Section 2 : Cloud Architecture
|
Lecture 1 | Cloud Architecture | 00:00:47 Duration |
|
Lecture 2 | An Overview of Cloud Architectures | 00:03:25 Duration |
|
Lecture 3 | Cloud Essential Characteristics | 00:05:22 Duration |
|
Lecture 4 | Cloud Service Models | 00:06:15 Duration |
|
Lecture 5 | Cloud Deployment Models | 00:04:55 Duration |
|
Lecture 6 | Shared Responsibilities | 00:08:35 Duration |
Section 3 : Infrastructure Security for Cloud
|
Lecture 1 | Infrastructure Security for Cloud | |
|
Lecture 2 | Software Defined Networking | 00:05:22 Duration |
|
Lecture 3 | SDN Security Benefits | |
|
Lecture 4 | Cloud Network Security | 00:07:08 Duration |
|
Lecture 5 | Securing Compute Workloads | |
|
Lecture 6 | Live Demo AWS EC2 Security and Best Practices | 00:28:51 Duration |
|
Lecture 7 | Management Plane Security | 00:06:29 Duration |
|
Lecture 8 | BCDR | 00:08:08 Duration |
Section 4 : Managing Cloud Security and Risk
|
Lecture 1 | Cloud Security and Risk | 00:01:28 Duration |
|
Lecture 2 | Governance | 00:03:02 Duration |
|
Lecture 3 | Managing Cloud Security and Risk | 00:03:22 Duration |
|
Lecture 4 | Legal Issues | 00:05:49 Duration |
|
Lecture 5 | Compliance | 00:02:37 Duration |
|
Lecture 6 | Audit Management | 00:03:00 Duration |
Section 5 : Data Security for Cloud Computing
|
Lecture 1 | Data Security in the Cloud | 00:00:57 Duration |
|
Lecture 2 | Cloud Data Storage | 00:05:11 Duration |
|
Lecture 3 | Securing Data in the Cloud | 00:02:39 Duration |
|
Lecture 4 | Encryption | 00:04:45 Duration |
|
Lecture 5 | Other Data Security Options | 00:04:26 Duration |
|
Lecture 6 | Data Security Lifecycle | 00:02:27 Duration |
Section 6 : Application Security for Cloud
|
Lecture 1 | Application Security for Cloud | 00:00:47 Duration |
|
Lecture 2 | Secure Software Development Life Cycle (SSDLC) | |
|
Lecture 3 | Testing and Assessment | 00:07:39 Duration |
|
Lecture 4 | DevOps | 00:11:42 Duration |
|
Lecture 5 | Secure Operations | 00:04:40 Duration |
Section 7 : IAM for Cloud
|
Lecture 1 | IAM for Cloud | |
|
Lecture 2 | Identity & Access Management Definitions | 00:08:21 Duration |
|
Lecture 3 | IAM Standards | 00:03:23 Duration |
|
Lecture 4 | IAM in Practice | 00:07:18 Duration |
Section 8 : Cloud Security Operations
|
Lecture 1 | Cloud Security Operations | 00:00:41 Duration |
|
Lecture 2 | SECaaS Fundamentals | 00:05:54 Duration |
|
Lecture 3 | SECaaS Categories | 00:04:15 Duration |
|
Lecture 4 | Incident Response | 00:09:29 Duration |
Section 9 : Miscellaneous Topics
|
Lecture 1 | Miscellaneous Topics | 00:00:59 Duration |
|
Lecture 2 | Misc Cloud Security Topics | 00:12:12 Duration |
|
Lecture 3 | ENISA Cloud Computing | 00:03:49 Duration |
|
Lecture 4 | Cloud Security Alliance - Cloud Controls Matrix | 00:05:30 Duration |
Section 10 : Course Conclusion
|
Lecture 1 | Course Conclusion | 00:00:44 Duration |
|
Lecture 2 | Study Tips | 00:08:26 Duration |