CCSP Pathway Completion Certificate
Complete this module to earn your pathway completion certificate.
CCSP Exam Prep​
In this module, we will learn about: The CCSP Course. The CCSP Exam. Before the Exam. During the Exam. Top…
BCDR Business Impact Analysis Considerations
In this module you will learn about Business Impact Analysis and steps. Identify Resource Requirements. Identify Recovery Priorities. Identify Preventative Controls. Create Contingency Strategies. Backup and…
Management in the Cloud Environment
In this module, you will learn about Incident management, Problem management, Release management, Deployment management, Configuration management, Change Management, Service…
Enforcing Cloud Application Security
In this module, you will learn about Enforcing Cloud Application Security. This includes Common pitfalls in Cloud Development, Common vulnerabilities sources, Cloud…
Protecting Cloud Data
In this module, you will learn about Protecting Cloud Data, Cloud data life cycle phases, Data dispersion and flow. Storage…
Advanced Cloud Architecture
In this module, you will learn about Cloud Architecture, Building block technologies, Virtualization, Storage, Networking, Databases, Orchestration, Cloud service capabilities,…
Cloud Services
In this module, you will learn about Cloud Services. This includes Cloud computing roles, Cloud service providers, Cloud service customers,…
Secure Software Development
In this module, you will learn about Programming languages, Programming language libraries, Programming languages tool sets, Integrated Development Environment, Continuous Integration, Continuous Delivery, Continuous Deployment, Security…
System Engineering Life Cycle
In this module, you will learn about NIST Special Publication 800-64, The System Development Life Cycle, Initiation, Development and acquisition,…
Threat Assessment Principles
In this module, you will learn about Risk Management Concepts, Threat Modeling Concepts, Supply Chain Risk Management concepts, Threat Intelligence, User and Entity Behavior…
Database Security
In this module, you will learn about DBMS controls, Lock controls, ACID test controls, Other DBMS controls, Deadlocking, Concurrency, Aggregation,…
Database Languages
In this module, you will learn about Accessing databases, Structured query language, SQL sub-languages, Database interface languages, Open Database Connectivity,…
Database Design
In this module, you will learn about DBMS architecture, Elements of a DBMS, Database models, Hierarchical database model, Network database…
Forensic Analysis Detection
In this module, you will learn about Firewalls, Packet filtering firewalls, Proxy firewalls, Application-level proxy firewalls, Circuit-level proxy firewalls, Stateful…
Forensic Analysis Storage
In this module, you will learn about Media management, Encryption at rest, Encryption during transportation, Removable media, Cloud storage, Virtual…
Forensic Analysis Principles
In this module, you will learn about Data breaches, Data breach disclosure laws, Chain of custody and authenticity, Interviewing, Reporting…
Executing Audits and Assessments
In this module, you will learn about Risk Analysis and Mitigation, Risk Management, Risk Identification, Qualitative Risk Assessment, Qualitative Risk…
Preparing for Audit and Assessment
In this module, you will learn about Audit Definition, Information Systems Auditor, Audit Plan, Audit Plan Process, Auditability and Accountability,…