Hey guys,
If you haven’t read the previous articles here they are:-
So, moving onto module 8 and this one is a bit different in that there are NO LABS.
Ok, so this module and then 9 after it and that’s the studying finished before I take a mock test to test my readiness so a little nervous.
What do we get to read up on?
This…
- Cloud Computing Concepts
- Introduction to Cloud Computing
- Types of Cloud Computing Services
- Separation of Responsibilities in the Cloud
- Cloud Deployment Models
- NIST Cloud Deployment Reference Architecture
- Overview of Handling Cloud Security Incidents
- Handling Cloud Security Incidents
- Incident Handling Responsibilities in the Cloud
- Challenges in Cloud Security Incident Handling and Response
- Challenges in Cloud Forensics
- Organizational Issues in Cloud Security Incident Handling
- Cloud Security Threats and Attacks
- Cloud Computing Threats
- Cloud Computing Attacks
- Preparation for Handling Cloud Security Incidents
- Preparation Steps to Handle Cloud Security Incidents
- Detecting and Analyzing Cloud Security Incidents
- Indicators of Cloud Security Incidents
- Detecting Cloud Security Incidents
- Evidence Data Concerns
- Cloud-based Log Analysis Tools
- Containment of Cloud Security Incidents
- Containment Tool for Cloud Security Incidents
- Eradication of Cloud Security Incidents
- Eradicating Cloud Security Incidents
- MITC Attack Detection Tool: Tripwire
- Recovery after Cloud Security Incidents
- Best Practices Against Cloud Security Incidents
- Cloud Security is the Responsibility of both Cloud Provider and Consumer
- Cloud Security Tools
And as usual a very well explained module, lots of information without going full blown information overload, nice graphics for explanation’s as well.
Not too much to add over this as don’t want to share too much of the content but like all modules so far its been good.
Regards
Alex