Mohamed Atef – Certified Cloud Security Professional – CCSP
Mohamed Atef – Certified Cloud Security Professional – CCSP
Your Instructor
Dr. Mohamed Atef is a distinguished Cybersecurity Consultant and Certified Instructor, boasting an impressive career spanning over two decades of hands-on experience orchestrating and overseeing impactful Cybersecurity projects. His expertise extends across a spectrum of pivotal domains, including:
- ISMS Implementation
- CS Standards / Compliance
- Security Operation Center
- BCP/DRP
- Penetration Testing
- CS Enterprise Technical Solutions
With an impressive track record, Dr. Atef has authored three books on cybersecurity and has garnered acclaim as the creator of 14 best-selling online courses. His passion for cybersecurity education shines through in his engaging and informative teaching style, making complex concepts accessible to learners of all levels.
-
Course Curriculum
Course materials and extra resources-
Preview
How to get access to the students portal (3:28)
Section 1: Introduction-
Preview
Welcome (0:42)
-
Preview
Introduction (3:26)
Section 2: Domain 1: Architectural Concepts and Design Requirements-
Preview
Domain 1 Architectural Concepts and Design Requirements (1:40)
- NIST SP 800 – 145 (1:50)
- Managed Service Provider (1:47)
- Why Cloud Computing? (5:02)
- IaaS vs PaaS vs SaaS (2:20)
- SaaS (4:20)
- PaaS (1:59)
- IaaS (1:54)
- Cloud Deployment (0:44)
- Public Cloud (8:00)
- Private Cloud (2:58)
- Hybrid Cloud (1:25)
- Community Cloud (2:13)
-
Preview
Select the right solution (6:08)
Section 3: Domain 2: Cloud Data Security- Introduction to Cloud Data Security (0:26)
- Storage Architecture (1:20)
- Data Life Cycle Security (4:22)
- Information Rights Management (1:38)
- IMR Demonstration (2:49)
- Data Loss Preventions (1:44)
- DLP Demonstration (14:55)
- Database Security (1:14)
- Data Encryption (5:26)
- Managment Control (8:01)
- Event Managment (3:30)
Section 4: Domain 3: Cloud Platform and Infrastructure Security- Introduction to Platform Security (0:52)
- Hypervisor (4:44)
- Virtualization Security (5:21)
- Perimeter Security (6:00)
Section 5: Domain 4: Cloud Application Security- Introduction to Cloud Application Security (2:10)
- Software Development Life Cycle – SDLC (4:31)
- OWASP Top 10 (3:48)
- What is SQL Injection Attack (9:48)
- SQL Injection attack (2:23)
- Cross Site Scripting (6:49)
- Software Defense (6:13)
- Cryptography on the Cloud (8:38)
- Common Computer Architecture (4:51)
- Access Managment (10:46)
- Cloud Threats (3:49)
- BCP and DRP (3:47)
- Business Continuity Plans (14:32)
- Disaster Recovery Plans (3:29)
- MTD-RTO-RPO (11:39)
- VA and PT (11:15)
Section 6: Domain 5: Operations- Introduction to Operations (0:37)
- Physical Security (5:27)
-
Preview
HR Security (5:37)
- Network Secuirty (4:20)
- Introduction to Risk (9:17)
- Risk (11:59)
- Asset Evaluation (18:28)
Section 7: Domain 6: Legal and Compliance- Domain 6 Introduction (1:00)
- Incident Response (8:37)
- Computer Forensic (4:18)
- Type of Evidence (0:53)
- Types of law (6:49)
- Lialibilty (3:52)
-
Shipping method
– After making a purchase, you will see a View your order link to the Downloads page. Here you can download all the files related to your order.
– In case the link is broken for any reason, please contact us and we will resend a new download link.
– If you can’t find the download link, please don’t worry about it. This course is usually available and shipped within one day
– The course you purchased will have lifetime access
– Our support staff is the best by far! Please contact us at email: [email protected] and we will be happy to help!