Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Official (ISC)2 Guide to the CCSP CBK
  • Table Of Contents Toc
The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK - Second Edition

By : Adam Gordon
close
close
The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK

By: Adam Gordon

Overview of this book

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skillset. The Official (ISC)2 Guide to the CCSPSM CBK second edition is your ticket for expert insight through the 6 CCSP domains. The book starts by focusing on building blocks of cloud-based systems and progresses to explaining concepts, principles, structures, and standards for designing, implementing, monitoring, and securing operating systems (OSs), equipment, networks, and applications. Next, you’ll cover cloud infrastructure components, existing threats, and mitigating and developing plans to deal with those threats. Moving ahead, you’ll ensure that the need for training and awareness in application security, the processes involved with cloud software assurance and validation, and the use of verified secure software are understood. Then, you’ll identify critical information and the execution of selected measures that eliminate adversary exploitation of critical information. In the end chapters, you’ll address ethical behavior and compliance with regulatory frameworks. By the end of this book, you’ll acquire the knowledge you'll need to implement strong information security programs in cloud computing.
Table of Contents (12 chapters)
close
close
Lock Free Chapter
1
Foreword
2
Introduction
9
EULA
2
Appendix B: Glossary
3
Appendix C: Helpful Resources and Links

Cryptography

When working with cloud-based systems, it is important to remember they are operating within and across trusted and untrusted networks. These can also be referred to as semihostile and hostile environments. As such, data held within and communicated to and between systems and services operating in the cloud should be encrypted.

Following are some examples of data in transit encryption options:

  • Transport layer security (TLS): A protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with a message. TLS is the successor to SSL.
  • SSL: The standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remains private and integral.
  • Virtual private network (VPN, such as IPSec gateway): A network that is constructed by using public wires...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
The Official (ISC)2 Guide to the CCSP CBK
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon