CCSP and Azure Data Protection Bundle
- IT & Software
- Feb 18, 2025

CCSP and Azure Data Protection Bundle, available at $59.99, has an average rating of 4.25, with 60 lectures, based on 29 reviews, and has 317 subscribers.
You will learn about You will be empowered to with all the skills needed to work and earn as a Cloud Security Engineer in Azure-predominant infrastructures. This course is ideal for individuals who are Cloud Architects, DevOps Engineers, Software Engineers It is particularly useful for Cloud Architects, DevOps Engineers, Software Engineers.
Enroll now: CCSP and Azure Data Protection Bundle
Summary
Title: CCSP and Azure Data Protection Bundle
Price: $59.99
Average Rating: 4.25
Number of Lectures: 60
Number of Published Lectures: 60
Number of Curriculum Items: 60
Number of Published Curriculum Objects: 60
Original Price: $22.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
Analytics India lists “Cloud Security Engineer” as one of the top roles to be filled in 2020!.
The World Economic Forum reported a shortage of people trained in cybersecurity in 2017, and that shortage has only increased since. It’s been projected by Cybersecurity Ventures that there will be 3.5 million unfilled cybersecurity jobs globally by 2021, up 350 percent from 2014. In the U.S. alone, the total cybersecurity workforce consists of nearly 1 million people, and there are currently around 500,000 unfilled positions. With the list of security-training companies and security certifications only growing, employment in this space is almost certain if you are qualified. The time to secure your spot has arrived.
OUR PROPOSAL
Deliver industry-focused; job-satisfying training bundles supporting the performance, effectiveness and attractiveness of each student we prepare for a highly-demanding work environment.
THE COURSE
Section 1: By adding a full Cloud Certified Security Professional (CCSP) course, we provide you with proven way to build your career and better secure critical assets in the cloud (all-round).
Section 2: The second segment introduces you to a high-level structure of Azure and how to effectively govern your environment using management groups, policies, Azure Blueprints, Resource Graph and Azure Monitor.
Section 3: The third segment of the course introduces you to a massive pool of information needed to successfully construct, design and deploy applications for the Azure cloud infrastructure.
Section 4: The fourth segment details how you can secure your storage environment, and data assets.
Section 5 (Upcoming): The last segment is a deep dive into practical labs demonstrating hands-on exercises in building security into your infrastructure.
Course Curriculum
Chapter 1: Certified Cloud Security Professional (CCSP)
Lecture 1: CCSP Exam Objectives
Lecture 2: Architecture Concepts
Lecture 3: CISSP Review: Business Impact Analysis (BIA)
Lecture 4: Design Requirements
Lecture 5: CISSP Review: Data Classification
Lecture 6: Data Classification
Lecture 7: Cloud Data Security
Lecture 8: Security in the Cloud
Lecture 9: Responsibilities in the Cloud
Lecture 10: Training, Awareness, and the Software Development Lifecycle (SDLC)
Lecture 11: ISO/IEC 27034-1/ Standards for Secure Application Development
Lecture 12: Identity and Access Management (IAM)
Lecture 13: Cloud Application Architecture
Lecture 14: Cloud Application Assurance and Validation
Lecture 15: Operations Elements
Lecture 16: Monitoring, Capacity, and Maintenance
Lecture 17: Change and Configuration Management (CM)
Lecture 18: Business Continuity and Disaster Recovery
Lecture 19: Legal Concepts
Lecture 20: US & International Laws
Lecture 21: EU Data Protection Directive and the GDPR
Lecture 22: Other Laws and PCI DSS
Lecture 23: eDiscovery, Evidence, Forensics, and Audit Reporting
Lecture 24: Security Policy
Lecture 25: Risk Management Overview
Lecture 26: Countermeasure Selection and Implementation
Lecture 27: Risk Management Framework
Lecture 28: Identifying Appropriate Supply Chain & Vendor Management Processes
Chapter 2: Azure Cloud Governance
Lecture 1: A High-Level Structure of Azure
Lecture 2: Effective Governance – 5 Steps to Achieve Speed and Control in Azure
Lecture 3: Effective Governance – The Role of Azure Enterprise Scaffold in Cloud Governance
Lecture 4: Effective Governance – Create Initiatives Using Azure Policy
Lecture 5: Effective Governance – Practice – Create Initiatives using Azure Policy
Lecture 6: Effective Governance – Create Azure Management Groups
Lecture 7: Effective Governance – Practice – Create Azure Management Groups
Lecture 8: Effective Governance – Inventory Management with Azure Resource Graph
Lecture 9: Effective Governance – Practice – Inventory Management with Azure Resource Graph
Lecture 10: Effective Governance – the one ring to rule em all – Azure Blueprints
Lecture 11: Effective Governance – Implementing ISO 27001 using Azure Blueprints
Lecture 12: Effective Governance – Control-Mapping ISO 27001 Controls to the Shared Services
Lecture 13: Effective Governance – Deploy/Configure the ISO 27001 Shared Services Blueprints
Lecture 14: Effective Governance – Metrics in Azure Monitor
Lecture 15: Effective Governance – Logs in Azure Monitor
Lecture 16: Effective Governance – Azure Monitor
Chapter 3: Architecting Azure and Cloud Applications
Lecture 1: Design Patterns
Lecture 2: 5 Pillars of Software Quality
Lecture 3: Microservices and Azure Service Fabric
Lecture 4: Security Features in Azure
Lecture 5: Designing and Implementing Big Data Solutions in Azure
Lecture 6: Azure Internet of Things (IoT) Architecture
Chapter 4: End-to-End Storage Security (Azure)
Lecture 1: Storage Accounts
Lecture 2: Key Management Systems and Azure Key Vault
Lecture 3: RBAC Roles for Azure Blob Data
Lecture 4: Storage Security Overview
Lecture 5: Securing the Management Plane in Storage Accounts
Lecture 6: Practice Lab: Securing the Management Plane in Storage Accounts
Lecture 7: Storage account Keys – Securing access to a Azure Key Vault
Lecture 8: Practice: Data Plane Access and Access Policies
Lecture 9: Shared Access Signatures (SAS)
Lecture 10: Encryption-at-Rest
Instructors

Cloud Brewery
Cloud Brewery: Empowering Your Cloud Security Journey
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Advanced Photoshop Manipulations Tutorials Bundle
- Life Insurance Annuity Ultimate Buyer’s Guide
- 3DS Max Tutorial. Learn The Art of Modelling and Animation
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Personal Finance
- The Beginner Forex Trading Playbook
- Dibuja y Esculpe tu COVID para Impresión 3d en Blender 2.8X
- Step-By-Step Stock Market Analysis and Real-Time Trades
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4SolidWorks Essential Training ( 2023 2024 )
- 5The Architecture of Oscar Niemeyer
- 6Polymer Clay Jewelry Making Techniques for Beginners
- 7Advanced Photoshop Manipulations Tutorials Bundle
- 8ZB Trading Cryptocurrency Price Action Course
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling