Final Exam: Network Security Specialist - apply the secure software development lifecycle
- classify key management services
- compare client and server-side encryption
- configure stateful firewalls in the cloud
- define file and database security
- define IAM roles
- define object storage security
- define privacy issues and jurisdiction
- define shared responsibility
- define the basics of risk management
- define training and awareness security
- describe challenges introduced by different types of cloud platforms such as public, private, hybrid, and community
- describe cloud computing definitions and roles
- describe common cloud vulnerabilities such as negligence, cyber threats, and system vulnerabilities
- describe common cryptographic protocols
- describe common development lifecycles
- describe compute technologies
- describe considerations when evaluating cloud service providers
- describe considerations when using the PaaS cloud service model
- describe key cloud characteristics
- describe key legal considerations when moving to the cloud
- describe legal requirements and risks
- describe software assurance and validation
- describe storage technologies
- describe the benefits of cloud offerings such as AWS and Azure
- describe the common deployment and migration strategies
- describe the SaaS cloud service model
- describe the six key stages in the data lifecycle - Create, Store, Use, Share, Archive, and Destroy
- describe the three-tier design model
- describe virtualization technologies
- describe web application firewalls
- design and plan security controls
- differentiate between cloud computing roles such as cloud service customer, cloud service architect, and cloud auditor
- differentiate between data ownership and data custody
- differentiate between on-premise and cloud implementations
- differentiate between physical and logical infrastructure for cloud operations
- ensure compliance with regulations and controls, like ITIL and ISO/IEC 20000-1
- list common clouds infrastructure components such as network, virtualization, and computer
- list data security strategies such as encryption and key management
- list network security concepts such data and media sanitization
- list potential threats against cloud computing infrastructure
- list requirements for business continuity strategy
- list specifics about cloud application architecture such as supplementary security components, cryptography, and sandboxing
- list the importance of performing a cost-benefit analysis
- list virtualization security concepts such as hypervisor and container security
- manage compliance with regulations and controls
- provide an overview of the IaaS cloud service model
- recognize challenges of cloud service such as IaaS, PaaS, SaaS
- recognize considerations related to cloud management
- recognize considerations when moving applications to the cloud
- recognize different privacy concerns such as private data and jurisdictional concerns
- recognize factors that can impact confidentiality, integrity, and availability of cloud data
- recognize how to implement operational controls and standards
- recognize key access control considerations
- recognize requirements for disaster recovery strategy
- secure management access
- secure the root account
- specify cloud benefits, components, and service models
- use audit processes and methodologies in the cloud
- use verified secure software
|