Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
Читать книгу The Official (ISC)2 CCSP CBK Reference - Leslie Fife, Aaron Kraus - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
105
Оглавление
Купить и скачать книгу
Вернуться на страницу книги The Official (ISC)2 CCSP CBK Reference
Оглавление
Страница 1
Страница 2
CCSP
®
: Certified Cloud Security Professional The Official (ISC)
2®
CCSP
®
CBK
®
Reference
Страница 4
Acknowledgments
About the Authors
About the Technical Editor
Foreword to the Third Edition
Страница 9
DOMAIN 1 Cloud Concepts, Architecture, and Design
UNDERSTAND CLOUD COMPUTING CONCEPTS
Cloud Computing Definitions
Cloud Computing
Service Models
Deployment Models
Cloud Computing Roles
Cloud Service Customer
Cloud Service Provider
Cloud Service Partner
Cloud Service Broker
Key Cloud Computing Characteristics
On-Demand Self-Service
Broad Network Access
Multitenancy
Rapid Elasticity and Scalability
Resource Pooling
Measured Service
Building Block Technologies
Virtualization
Storage
Networking
Databases
Orchestration
DESCRIBE CLOUD REFERENCE ARCHITECTURE
Cloud Computing Activities
Cloud Service Capabilities
Application Capability Types
Platform Capability Types
Infrastructure Capability Types
Cloud Service Categories
Software as a Service
Platform as a Service
Infrastructure as a Service
Cloud Deployment Models
Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud
Cloud Shared Considerations
Interoperability
Portability
Reversibility
Availability
Security
Privacy
Resiliency
Performance
Governance
Maintenance and Versioning
Service Levels and Service Level Agreements
Auditability
Regulatory
Impact of Related Technologies
Machine Learning
Artificial Intelligence
Blockchain
Internet of Things
Containers
Quantum Computing
UNDERSTAND SECURITY CONCEPTS RELEVANT TO CLOUD COMPUTING
Cryptography and Key Management
Access Control
Data and Media Sanitization
Overwriting
Cryptographic Erase
Network Security
Network Security Groups
Cloud Gateways
Contextual-Based Security
Ingress and Egress Monitoring
Virtualization Security
Hypervisor Security
Container Security
Common Threats
UNDERSTAND DESIGN PRINCIPLES OF SECURE CLOUD COMPUTING
Cloud Secure Data Lifecycle
Cloud-Based Disaster Recovery and Business Continuity Planning
Cost-Benefit Analysis
Functional Security Requirements
Portability
Interoperability
Vendor Lock-in
Security Considerations for Different Cloud Categories
Software as a Service
Platform as a Service
Infrastructure as a Service
EVALUATE CLOUD SERVICE PROVIDERS
Verification against Criteria
International Organization for Standardization/International Electrotechnical Commission
Payment Card Industry Data Security Standard
System/Subsystem Product Certifications
Common Criteria
FIPS 140-2
Summary
{buyButton}
Подняться наверх