Introduction
Cloud security operations
()
What you need to know
()
Study resources
()
1. Physical and Logical Infrastructure
Hardware security configuration
()
Virtualization security configuration
()
2. Secure Infrastructure Operations
Securing local and remote access
()
Security zones
()
Building lines of communication
()
3. Network Operations
TCP/IP networking
()
IP addressing and DHCP
()
DNS
()
Network ports
()
ICMP
()
Public and private addressing
()
Subnetting
()
VLANs and network segmentation
()
4. Network Security
Network intrusion detection and prevention
()
Firewalls
()
VPNs and VPN concentrators
()
Network security groups
()
5. Security Baselines and Standards
Developing security baselines
()
Leveraging industry standards
()
Customizing security standards
()
Host availability
()
6. Monitoring
Performance and capacity monitoring
()
Managing a SOC
()
The ITIL model
()
7. Threat Assessment
Security assessment tools
()
Scan for threats and vulnerabilities
()
Assess threats
()
Threat assessment techniques
()
Penetration testing
()
8. Incident Management
Build an incident response program
()
Incident communications plan
()
Incident identification
()
Escalation and notification
()
Mitigation
()
Recovery and reconstitution
()
Lessons Learned and reporting
()
9. Investigations and Forensics
Conducting investigations
()
Evidence types
()
Digital forensics
()
Chain of custody
()
Conclusion
Continuing your CCSP certification journey
()