There are several (overlapping) ones. Collect them all!
- CCSK (Cloud Security Alliance Certificate of Security Knowledge)
- Offensive Security
- Cisco CCIE
- EC-Council Penetration Tester
- AWS Security
- Microsoft SC-900 & AZ-500
- Secure Coding
- More on Security
NOTE: Content here are my personal opinions, and not intended to represent any employer (past or present). “PROTIP:” flags information unique to this website, based on my personal research and experience.
This map is from security techo thriller book reviewer Paul Jerimy at https://pauljerimy.com/security-certification-roadmap: Click for full screen image.
CCSK (Cloud Security Alliance Certificate of Security Knowledge)
The Certificate of Cloud Security Knowledge (CCSK) is marketed as a complement to other credentials (CCAK, CISA, CISSP, CCSP) by the Seattle-based Cloud Security Alliance (CSA) which also markets training.
QUESTION: The CSA Cloud Trust Protocol Daemon protoype inactive?
Whizlabs has sample tests but questionable quality with too many double negative questions and answers.
The CCSK is an open-book, online exam, completed in 90 minutes. Purchasing the exam costs $395 (free to veterans) for two test attempts, which you will have 2 years to use. The minimum passing score is 80% of the 60 multiple-choice vendor-neutral questions selected randomly from the CCSK question pool in v4 of the exam available December 1, 2017:
6% are based on the 2009 Cloud Computing report from the ENISA (European Network and Information Security Agency)
7% are based on CSA’s CCM (Cloud Controls Matrix) spreadsheet 3.0.1 which cross references the many other standard worldwide (AICPA, PIPEDA, CIS, COBIT, CSA, ENISA, FedRAMP, GAAP, HIPPA, HITRUST, IEC, NIST, PCI, etc.). It is the basis for CSA’s Consensus Assessments Initiative Questionnaire (CAIQ) industry-accepted way to document which security controls exist in IaaS, PaaS, and SaaS services, which inputs to “Level 1” of the STAR (CSA Security Trust Assurance and Risk) Registry of vendors.
87% are based on the CSA Guidance v4 at PROTIP: https://github.com/cloudsecurityalliance/CSA-Guidance – a masterwork providing a summary of terms and concepts which integrate the various worldwide standards.
https://www.meetup.com/Cloud-Security-Alliance-Northeast-Ohio-Chapter/events/275707693/ Cloud Security Alliance NorthEast Ohio chapter
Domain 1 Cloud Computing Concepts and Architectures
- Definitions of Cloud Computing
- Service Models
- Deployment Models
- Reference and Architecture Models
- Logical Model
- Cloud Security Scope, Responsibilities, and Models
- Areas of Critical Focus in Cloud Security
Domain 2: Governance and Enterprise Risk Management
- Tools of Cloud Governance
- Enterprise Risk Management in the Cloud
- Effects of various Service and Deployment Models
- Cloud Risk Trade-offs and Tools
Domain 3: Legal Issues, Contracts and Electronic Discovery
- Legal Frameworks Governing Data Protection and Privacy
- Cross-Border Data Transfer (GDPR)
- Regional Considerations (California)
- Contracts and Provider Selection
- Due Diligence
- Third-Party Audits and Attestations (SOC, ISO)
- Electronic Discovery
- Data Custody
- Data Preservation
- Data Collection
- Response to a Subpoena or Search Warrant
Domain 4: Compliance and Audit Management
- Compliance in the Cloud
- Compliance impact on cloud contracts
- Compliance scope
- Compliance analysis requirements
- Audit Management in the Cloud
- Right to audit
- Audit scope
- Auditor requirements
Domain 5: Information Governance
- Governance Domains
- Six phases of the Data Security Lifecycle and their key elements
- Data Security Functions, Actors and Controls
Domain 6: Management Plane and Business Continuity
- Business Continuity and Disaster Recovery in the Cloud
- Architect for Failure
- Management Plane Security
Domain 7: Infrastructure Security
- Cloud Network Virtualization
- Security Changes With Cloud Networking
- Challenges of Virtual Appliances
- SDN Security Benefits
- Micro-segmentation and the Software Defined Perimeter
- Hybrid Cloud Considerations
- Cloud Compute and Workload Security
Domain 8: Virtualization and Containers
- Mayor Virtualizations Categories
Domain 9: Incident Response
- Incident Response Lifecycle
- How the Cloud Impacts IR
Domain 10: Application Security
- Opportunities and Challenges
- Secure Software Development Lifecycle
- How Cloud Impacts Application Design and Architectures
Domain 11: Data Security and Encryption
- Data Security Controls
- Cloud Data Storage Types
- Managing Data Migrations to the Cloud
- Securing Data in the Cloud
Domain 12: Identity, Entitlement, and Access Management
- IAM Standards for Cloud Computing
- Managing Users and Identities
- Authentication and Credentials
- Entitlement and Access Management
Domain 13: Security as a Service
- Potential Benefits and Concerns of SecaaS
- Major Categories of Security as a Service Offerings
Domain 14: Related Technologies
- Big Data
- Internet of Things
- Serverless Computing
ISC2.org (a non-profit), publishes a Code of Ethics at https://www.isc2.org/ethics
Prices for exams taken at Pearson Vue test centers:
Even at $749 USD, the Certified Information Systems Security Professional exam (pronouced “sis pee”) is a sought-after certification on leadership in cybersecurity. It is the “gold standard” of vendor-neutral cybersecurity certifications. Earning it proves you understand cybersecurity from a management viewpoint -— a requirement if your organization is subject to PCI, GDPR, HIPAA, SOX, ISO 27001, or other regulations.
The first version of the Common Body of Knowledge (CBK) was finalized in 1992 and the CISSP credential was launched in 1994. Since it’s an internationally recognized, there are questions about Canada, UK, EU, etc.
Rather than the previous 250 questions over 6 hourse, the CISSP exam is now adaptive, asking 100-150 questions, depending on whether answers are correct. PROTIP: With Adaptive Testing, your objective is to get hard questions. So study as if you’ll get all hard questions. The better you are, the harder the test is. If you aced the first 10 questions, you’ll be put into “brutal mode”. With CAT (Computer Adaptive Testing), the more one aces every question, the quicker she would get done before the 3 hours. VIDEO: This also means you won’t be able to go back and change answers in previous questions answered.
There is a 5 year experience requirement, attested by other professionals.
You need to pass at least 70% on each of the eight CISSP domains.
PROTIP: I think Mike Chapple’s 33-hour LinkedIn Learning videos (and on YouTube) provide the most detailed, best sequenced learning, updated for the May 2021 BOK. He includes demos of the most popular software. Numbers to the right of his videos by domain are counts of questions in the OReilly/Pearson bank:
- Security and Risk Management - 334
- Asset Security - 44
- Security Architecture and Engineering - 268
- Communication and Network Security - 114 on OSI model
- Identity and Access Management (IAM) - 82 on biometrics
- Security Assessment and Testing - 41 on NIST SP 800-92
- Security Operations - 245
Secure Software Development Lifecycle - 164 includes a demo of ZAP Proxy for fuzzing, Git & GitHub.
Official Flash cards of definitions:
- The Information Security Environment - 18 items
- Information Asset Security - 17 items
- Identity and Access Management (IAM) - 24 items
- Security Architecture and Engineering - 48 items
- Communication and Network Security - 88 items
- Software Development Security - 101 items
- Security Assessment and Testing - 18 items
- Security Operations - 62 items
- Putting it All Together - 34 items
Quizzes on CloudAcademy.com by exam domain:
- Security and Risk Assessment
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management
- Security Testing and Assessment
- Security Operations
- Security Development Security
$58 Sybex BOOK: “(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle Second Edition” by Mike Chapple, who has a video course on LinkedIn Learning which is deep yet concise, with effective sequencing of topics. He also shows demos of security-related Windows programs where appropriate, such as Windows Firewall Log Viewer.
Joseph Delgadillo’s cissp-testprep-cheatsheet provides a PowerPoint file.
My notes on cyber security highlights what to remember.
CloudAcademy.com “CISSP Prep.” [subscription] has a timed (40 minute) Knowledge Check of about 20 questions for each domain, available on mobile phones.
Video prep courses view:
FreeCodeCamp has a single 13 hour video FREE on YouTube to cover all topics. From 2020.
OReilly LiveSessions CISSP by Sari Greene (sarigreene.com) I think is indeed the most thorough (deep dive) of all video courses I’ve viewed. 26 hours. A quize of terms at the end of each video. From 2018.
YouTube playlist on CISSP FREE by “Skillset” provides a good overview, but it’s from 2016.
Pearson CSSLP practice test provides questions. The PearsonTestPrep.com software enables display of individual domains from all 4 tests at once, showing only questions you missed before. Explanations are given as to why each response is correct or not.
$599 USD CSSLP (Certified Secure Software Lifecycle Professional) is the secure software development certification. The 15 Sep 2020 edition is NOT covered in the All-in-One book by Wm. Arthur Conklin, Daniel Paul Shoemaker.
Jerod Brennen created video courses (on LinkedIn Learning) for each domain:
Secure Software Concepts Released Feb 12, 2020 (Confidentiality, Integrity, Availability triad, IAM, design)
Secure Software Design 1h 48m
Secure Software Implementation/Programming
Secure Lifecycle Management
Secure Deployment, Operations, and Maintenance
Supply Chain and Software Acquisition
Pluralsight video courses by Kevin Henry (kevinmhenry at msn) is from 2017 and is too high general for me.
8 YouTube videos from The Cloud Tech Guy Joe Jan, 2020 talks about the subject rather than taking a deep dive.
Practice Exams 2020 by Chandrika Patel
Mindmap videos: https://www.youtube.com/channel/UCXk6…
- Cissprep.net Memorisation sheet
- Exam tips: https://www.youtube.com/watch?v=HWg2g…
CISSP MasterClass™ Mission by Sagar Bansal
https://www.sageknowsit.com/product/ebook-infosec-brain-dump-template$14.99 eBook: InfoSec Brain Dump Template w/Study Schedule
- BOOK: ISC2 official practice tests
YouTube videos with content index (and ads) by Rob Richa, with John Berti of Destination Certifications:
- Models and Frameworks: https://www.youtube.com/watch?v=qZB6_lp9M30&t=30s
- Evaluation Criteria: https://www.youtube.com/watch?v=WqHmDL7YAvw&t=30s
- Trusted Computing Base: https://www.youtube.com/watch?v=fwU7n_3h058&t=30s
- Vulnerabilities in Systems: https://www.youtube.com/watch?v=fPUypU7ysMw&t=30s
- Cloud: https://www.youtube.com/watch?v=-rWQ7YuxiLY&t=30s
- Cryptography: https://www.youtube.com/watch?v=LLRaa0kOMDM&t=30s
- Digital Certificates, Digital Signatures & PKI: https://www.youtube.com/watch?v=8XKdFSG3ua4&t=30s
- Cryptanalysis: https://www.youtube.com/watch?v=pnITDgs63M4&t=30s
- Physical Security: https://www.youtube.com/watch?v=7ESQwNJ9HXU&t=30s
- Access Control Overview: https://www.youtube.com/watch?v=BUcoABZzeQ4&t=30s
- Single Sign-on & Federated Access: https://www.youtube.com/watch?v=_U4QMIxVk8M&t=30s
- Security Assessment and Testing Overview: https://www.youtube.com/watch?v=eDVZvw5NziA&t=30s
- Vulnerability Assessment and Penetration Testing: https://www.youtube.com/watch?v=vZ0S8GdWiIk&t=30s
- Logging & Monitoring: https://www.youtube.com/watch?v=cwcARccyWyY&t=30s
- Security Operations:
- Investigations: https://www.youtube.com/watch?v=Urev5cZgny8&t=30s - Locard’s Principle: perp. will leave something behind and take something
- Incident Response: https://www.youtube.com/watch?v=PwxFwndQ7Jk&t=30s
- Malware: https://www.youtube.com/watch?v=SVbrRozyIpo&t=30s
- Patching & Change Management: https://www.youtube.com/watch?v=xX4U6Lz82Bk&t=30s
- Recovery Strategies: https://www.youtube.com/watch?v=DrrfrJBnx28&t=30s
- Business Continuity Management (BCM): https://www.youtube.com/watch?v=oAjNL3I_3-E&t=30s
- Secure Software Development: https://youtu.be/fS5WWjuyFmQ&t=30s
- Databases: https://youtu.be/-70DBd6cNDw&t=30s
posted by SANS Blue Team Ops:
Ignore the Orange Book. Focus on 15408 Common Criteria on how to build computers based on Bella-Padua.
- Cloud Concepts, Architecture and Design
- Cloud Data Security
- Cloud Platform & Infrastructure Security
- Cloud Application Security
- Cloud Security Operations
- Legal, Risk and Compliance
This PDF has the details.
ccsp.alukos.com is a GitBook-formatted listing with glossary of terms, laws by country, standards by each body, frameworks.
I think ISC2 is being too clever with their questions, past the point of making the test as much about knowing the twisted mind of the test maker rather than understanding the underlying material. I wich that ISC2 test writers see “Advanced” level of “knowledge” as higher order thinking (such as evaluation) rather than teasing out twisted meaning of words in tests.
YOUTUBE: CCSP Exam Cram series by Prabh Nair
LinkedIn audio review with practice questions. By Mike Chapple. I recommend this because it has quizzes and shows use of apps such as WebGoat.
Pluralsight CCSP by Lyron H. Andrews CISSP/CCSP/SSCP/CISM/CCSK
ISACA.org asks for a $50 test application processing fee in addition to membership fee for a US$185 discount to the US$760 online, remotely-proctored exam fee.
CRISC (Certified in Risk and Information Systems Control)
CGEIT (Certified in the Governance of Enterprise IT)
CDPSE (Certified Data Privacy Solutions Engineer) covers privacy governance, privacy architecture, data lifecycle
Offensive Security is a for-profit company offering courses with labs and certifications:
OSCP (Certified Professional) is one of the most difficult to pass because it is part hazing ritual, proctored via webcam. It is a 24-hour time-boxed test where you penetrate of as many machines as you can within a massive virtual environment, using Kali Linux.
OSEE (Offensive Security Exploitation Expert) covers DEP, ASLR evasion, heap spraying, function pointer overwrites. OSEE holders must complete the Advanced Windows Exploitation (AWE) course by Offensive Security held in a live hands-on environment at a Black Hat conference in Las Vegas, NV.
That plus pass a rigorous 72-hour practical exam that includes preparing a comprehensive penetration test report. So this certificate indicates a level of expertise far beyond that of most penetration testers.
Topics include: 64-bit Exploitation, Debugging, DEP ByPass, Disarming EMET Mitigations, Exploit Development, Heap Spray, Kernel Driver Exploitation, Kernel Pool Exploitation, Memory Protection Bypass, NX/ASLR Bypass, ROP Chain, Sandbox Escape, Shellcode, WinDBG, Windows Kernel Exploitation.
OSWE (OSWE Web Expert) covers web security testing: XSS attacks, SQL injection, XML external entity injection, Weak random token generation, DOM XSS, Server side template injection, Command injection via websockets (black box material)
OSCE is being retired. It covered exploits used by attackers to breach security infrastructures
SANS formed the Global Information Assurance Certification (GIAC) program to act as the certification arm for its training courses. GIAC has a https://www.giac.org/certifications/get-certified/roadmap to dozen of exams across six specific domains. It offers remote proctoring through ProctorU.
GEVA (GIAC Enterprise Vulnerability Assessor)requires 71% correct from among 75 questions over 2 hours. It covers Vulnerability assessment framework planning and methodology in an enterprise environment; Discovery and validation of vulnerabilities using tactics like network scanning and PowerShell scripting; Remediation and reporting techniques utilizing proper data management
GCIH (GIAC Certified Incident Handler) requires an undeterminate correct from among 100-150 questions over 4 hours. It covers Incident Handling (Response) and Computer Crime Investigation; Computer and Network Hacker Exploits; Hacker Tools (Nmap, Nessus, Metasploit, Netcat). A single chapter on NIST800-61.
Based on the NICE framework
GCED (GIAC Certified Enterprise Defender) requires 70% correct from among 115 questions over 3 hours. It covers Incident handling and computer crime investigation; Computer and network hacker exploits; Hacker tools (Nmap, Nessus, Metasploit and Netcat)
GSE (GIAC Security Expert) is the premier security-related certification available today. After you score at least the gold level in 2 of 3 tests above, you take a multiple-choice test, then a hands-on lab (not available due to COVID). The proctored Exam has Minimum Passing Score of 64% to 24 VM-based Hands-On Questions with a 3-Hour Time Limit.
So compliance with DoD 8570-2005 retired by NIST DoD Directive 8140.01 means job candidates need to have passed to it to just apply for some government jobs. DoD 8140 expands on DoD 8570 to leverage the Defense Cybersecurity Workforce Framework (DCWF), which draws from the original National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) and DoD Joint Cyberspace Training and Certification Standards (JCT&CS).
CompTIA certifications were designed for compliance with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
Security+ is considered an “entry level” exam but its detailed coverage of some obscure encryption protocols makes it difficult even for professionals.
PROTIP: I passed the Security+ after studying literally 4 years, on and off. What helped me get over the intimidation is to seek out the trick questions and delight in them as an intellectual curiosity.
CASP+ (CompTIA Advanced Security Practioner) exam CAS-003 is a hands-on, performance-based certification for practitioners — not managers — at the advanced skill level of cybersecurity – implementing solutions policies and frameworks. For $396 for COMPTia members or $466 USD (or $799 with retake and $849 with Labs), you’ll have 165 minutes to answer 90 multiple-choice and “performance-based” questions, for pass/fail grading. The domains:
- 19% Risk Management
- 25% Enterprise Security Architecture
- 20% Enterprise Security Operations
- 23% Technical Integration of Enterprise Security
- 13% Research, Development, and Collaboration
Performance-based questions (PBQs) test a candidate’s ability to solve problems in a simulated environment that approximates a virtual environment with a firewall, network diagram, terminal window, or operating system. 12 Flash cards Sample
To check config on RedHat 5.5:
Services to disable on DNS:
http, mysqld, lopd, bluetooth, wpa supplicant
To stop service:
service httpd stop
CASP+ satisfies Baseline Certification for DoD IAT (Information Assurance Technical) Level III, IAM (Information Assurance Management) Level II, and IASAE (Information Assurance Security Architecture and Engineering) level I and II jobs.
CASP+ Practice Tests by Nadean H. Tanner (at Puppet, Metasploit)
- Exploit-Exercises.com provides virtual machines, documentation, and challenges covering a wide range of security issues.
- hacking-lab.com/index.html provides capture-the-flag (CTF) exercises in a variety of fields.
- www.owasp.org/index.php/OWASP_Hacking_Lab OWASP Hacking Lab provides excellent web application–focused exercises.
- PentesterLab provides subscription-based access to penetration testing exercises
O’Reilly video 18+ hours released Jan. 2018 by Michael J. Shannon
1: Business and Industry Influences and Risks
2: Organizational Security Privacy Policies and Procedures
3: Risk Mitigation Strategies and Controls
4: Risk Metric Scenarios for Enterprise Security
Enterprise network and Security Architecture
5: Integrating Network and Security Components, Concepts, and Architectures
6: Integrating Security Controls for Host Devices
7: Integrating Controls for Mobile and Small Form Factor Devices
8: Selecting Software Security Controls
Enterprise Security Operations
9: Conducting Security Assessments
10: Selecting the Proper Security Assessment Tools
11: Implementing Incident Response and Recovery
Technical Integration of Enterprise Security
12: Integrating Hosts, Storage, and Applications in the Enterprise
13: Integrating Cloud and Virtualization Technologies in the Enterprise
14: Integrating and Troubleshooting Advanced AAA Technologies
15: Implementing Cryptographic Techniques
16: Secure Communication and Collaboration Solutions
Research, Development and Collaboration
17: Applying Research Methods for Trend and Impact Analysis
18: Implementing Security Activities Across the Technology Life Cycle
19: Interacting Across Diverse Business Units
Kelly Handerhan’s Cybrary videos
CASP CAS-003 help on Reddit (archived)
Ucertify has good labs
Sybex book has labs as well
- Understanding Risk Management - 2hr 22min QUIZ
- Network and Security - 1hr 55m QUIZ
- Implementing Advanced Authentication and Cryptographic Techniques - 1hr 46min QUIZ
- Implementing Security for Systems, Applications, and Storage - 2hr 23min QUIZ
- Implementing Security for Cloud and Virtualization Technologies - 1hr 45min QUIZ
- Utilizing Security Assessments and Incident Response - 1hr 42min QUIZ
The Official CompTIA CASP+ Self-Paced Certification Study Guide (Exam CAS-003) Paperback by Jason Nufryk is $219.00
Memory dump tools: Memdump, KnTTools on Windows, FATKit
Runtime Debugging: AddressSanitizer, C# Deleaker, Software Verify
Attestation provides evidence about a target to an appraiser so that policy compliance can be determined prior to authorization of access.
The Annualized Loss Expectancy (ALE) is the product of the Annual Rate of Occurrence (ARO) multiplied by the Single Loss Expectancy (SLE).
Bluesnarfing is the unauthorized access of a device by an attacker who is trying to access information on the device.
Hyperconvergence takes convergence a step further by utilizing software to perform integration without requiring hardware changes.
CompTIA CySA+ (CSO-001) exam launched April 21, 2020 on Vue & Pearson online $359 to answer 75% of 85 questions in 165 minutes
Threat and vulnerability management:
- Explain the importance of threat data and intelligence.
- Given a scenario, utilize threat intelligene to support organizatoinal security.
- Given a scenario, perform vulnerability management activities.
- Given a scenario, analyze the output from common vulnerability assessment tools.
- Explain the threats and vulnerabilities associated with operating in the cloud.
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities.
- Software and systems security
- Given a scenario, apply security solutions for infastructure management
- Explain software assurance best practices
- Explain hardware assurance best practices
- Security operations and monitoring:
- Given a scenario, analyze data as part of security monitoring activities.
- Given a scenario, implement configuration changes to existing controls to improve security.
- Explain the importance of proactive threat hunting.
- Compare and contrast automation concepts and technologies.
- Incident response
- Explain the importance of the incident response process.
- Given a scenario, apply the appropriate incident response procedure.
- Given an incident, analyze potential indicators of compromise.
- Given a scenario, utilize basic digital forensics techniques.
- Compliance and assessment
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation
- Explain the importance of frameworks, policies, procedures and controls.
Only 4,000 people have passed it world-wide.
EC-Council Penetration Tester
(International Council of E-Commerce Consultants) EC-Council from Malaysia since 2001 has 3 levels of certification. See FAQ at https://cert.eccouncil.org/faq.html
33% off until Dec 31.
The CEHv10 (Certified Ethical Hacker version 11) ANSI exam as defined by https://www.eccouncil.org/programs/certified-ethical-hacker-ceh asks 125 multiple-choice questions in 4 hours.
The exam is protored by ECC EXAM (as 312-50) and Pearson VUE (as 312-50), courseware is discounted to $850, with upgrade for VUE exam for $100. from “Aspen iLabs”.
Exam Brochure: https://www.eccouncil.org/wp-content/uploads/2016/07/CEHv10-Brochure.pdf
CEH Candidate Handbook: https://s3-us-west-2.amazonaws.com/edm-image/documents/CEH-Handbook-v2.2.pdf
CPENT / ECSA
The Advanced level is ECSA: Security Analyst https://www.eccouncil.org/programs/certified-security-analyst-ecsa-practical/ is being phased out in Oct. 2020 in favor of the CPENT (Certified Penetration Testing Professional).
Covers “double pivoting”.
$2199 w/ training, $799 for challenge.
At the Expert Level is LPT: Licensed Penetration Tester [Master] https://www.eccouncil.org/programs/licensed-penetration-tester-lpt-master/ with training via CPENT.
EC-Council built the Advanced Penetration Testing Cyber Range (ECCAPT).
See my notes at https://wilsonmar.github.io/aws-security
Microsoft SC-900 & AZ-500
PDF: Updated Jan 21, 2021 Microsoft’s AZ-500 Azure Security Technologies Associate online exam for people who maintain security posture, identify and remediate vulnerabilities by using a variety of security tools, implement threat protection, and respond to security incident escalations. Domains:
- Manage Identity and Access (30-35%)
- Implement Platform Protection (15-20%)
- Manage Security Operations (25-30%)
- Secure data and applications (20-25%) (Policy and Data Infrastucture & Data at Rest, App Security, Key Vault)
It costs $165 to Pearson Vue, less if you’re a certified trainer or in the esi.microsoft.com/getcertification, which has practice tests from MeasureUp.
Prequisite is certification as either:
- Microsoft Certified: Azure Developer Associate exam AZ-204 “Developing Solutions for Microsoft Azure”.
Microsoft’s learning paths for AZ-500 :
Secure your cloud applications in Azure 6 Modules - 5 hr 36 min
- Microsoft Azure Well-Architected Framework - Security - 1 hr 2 min
- Top 5 security items to consider before pushing to production - 45 min
- Create security baselines - 1 hr
- Manage secrets in your server apps with Azure Key Vault - 46 min
- Secure an ASP.NET Core web app with the Identity framework - 1 hr 8 min
- Control authentication for your APIs with Azure API Management - 55 min
Implement resource management security in Azure 6 Modules - 3 hr 27 min
- Protect against security threats on Azure - 25 min
- Build a cloud governance strategy on Azure - 48 min
- Control and organize Azure resources with Azure Resource Manager - 46 min
- Secure your Azure resources with Azure role-based access control (Azure RBAC) - 37 min
- Manage access to an Azure subscription by using Azure role-based access control (Azure RBAC) - 21 min
- Create custom roles for Azure resources with role-based access control (RBAC) - 30 min
Implement network security in Azure 5 Modules - 5 hr 8 min
- Secure network connectivity on Azure - 32 min
- Configure the network for your virtual machines - 1 hr 34 min
- Secure and isolate access to Azure resources by using network security groups and service endpoints - 43 min
- Encrypt network traffic end to end with Azure Application Gateway - 1 hr 17 min
- Monitor and troubleshoot your end-to-end Azure network infrastructure by using network monitoring tools - 1 hr 2 min
Implement virtual machine host security in Azure 6 Modules - 6 hr 4 min
- Microsoft Azure Well-Architected Framework - Security - 1 hr 2 min
- Create security baselines - 1 hr
- Create a Linux virtual machine in Azure - 1 hr 26 min
- Create a Windows virtual machine in Azure - 51 min
- Secure your Azure virtual machine disks - 1 hr 1 min
- Protect your servers and VMs from brute-force and malware attacks with Azure Security Center - 44 min
Manage identity and access in Azure Active Directory 9 Modules - 5 hr 17 min
- Protect against security threats on Azure - 25 min
- Create an Azure account - 39 min
- Manage users and groups in Azure Active Directory - 50 min
- Create Azure users and groups in Azure Active Directory - 41 min
- Secure your application by using OpenID Connect and Azure AD - 50 min
- Secure Azure Active Directory users with Multi-Factor Authentication - 38 min
- Manage device identity with Azure AD join and Enterprise State Roaming - 25 min
- Allow users to reset their password with Azure Active Directory self-service password reset - 31 min
- Add custom domain name to Azure Active Directory - 18 min
Manage security operations in Azure 8 Modules - 6 hr
- Protect against security threats on Azure - 25 min of tailwindtraders.com. Its security posture is monitored using Azure Security Center adaptive application controls to define rules for secure score. Azure Logic Apps and Security Center connectors. Azure Sentinel SIEM using Common Event Format (CEF) messaging standard, Syslog, or REST API.
- Create security baselines - 1 hr
- Identify security threats with Azure Security Center - 43 min
- Resolve security threats with Azure Security Center - 44 min
- Protect your servers and VMs from brute-force and malware attacks with Azure Security Center - 44 min Security Center uses network security group (NSG) rules to restrict access to management ports when not in use.
- Analyze your Azure infrastructure by using Azure Monitor logs - 36 min
- Improve incident response with alerting on Azure - 53 min
- Capture Web Application Logs with App Service Diagnostics Logging - 55 min
Well Architected Framework
- Cost Optimization - Managing costs to maximize the value delivered.
- Operational Excellence - Operations processes that keep a system running in production.
- Performance Efficiency - The ability of a system to adapt to changes in load.
- Reliability - The ability of a system to recover from failures and continue to function.
- Security - Protecting applications and data from threats.
Peter Zerger (@pzerger) :
CloudAcademy.com 16h video series by Thomas Mitchell
Google Professional Cloud Security Engineer, for $200 for 50 questions in 120 minutes, will have obtained the skills to “enable organizations to design and implement a secure infrastructure on Google Cloud Platform. Through an understanding of security best practices and industry security requirements, this individual designs, develops, and manages a secure infrastructure leveraging Google security technologies. Topics and skills:
- Configure access within a cloud solution environment
- Configure network security
- Ensure data protection
- Manage operations within a cloud solution environment
- Ensure compliance
SAP has two levels of certifications for Security pros. Both costs $242 USD to answer 65% of 80 multiple-choice questions in 3 hours.
- Authorization and Role Maintenance - >12%
- SAP Fiori Authorizations and S/4HANA - >12%
- Access Governance and Compliance in SAP - 8%-12%
- Infrastructure Security and Authentication - 8%-12%
- User Administration8% - 12%
- Security Monitoring and Security Assessment8% - 12%
- Data Privacy Governance and Cybersecurity8% - 12%
- Security Audit - 8%-12%
P_TSEC10_75 SAP Certified Technology Professional - System Security Architect is the most popular among all SAP exams.
- SAP System Security Fundamentals - >12%
- Authorization Concept for SAP Business Suite - >12%
- Authorization Concept for SAP S/4HANA - >12%
- Secure SAP System Management - >12%
- SAP Netweaver Application Server Security - >12%
- Authorization, Security and Scenarios in SAP HANA8% - 12%
Security in SAP Gateway and SAP Fiori System Landscape - <8%
- After passing, post your cert on Credly
- $606 USD CER006 C_GRCAC_12 SAP GRC (Governance, Risk, and Compliance) AC certification exam
- SAP provides a 14 day free trial of their $25/month Learning Hub (using an “S-account”) at https://learninghub.sap.com/. 800-872-1727
CodeBashing.com from Checkmarx has gamified tutorials on identifying and mitgating vulnerabilities in code for many languages: Hacking Headlines, Source Code (for each language): Android (Java), iOS, C/C++, C# .NET, .NET Backend, .NET Advanced, Go, Java, Java Backend, Java Advanced, Scala NodeJS, PHP, Python Django, Ruby on Rails,
Podcast: Evan Francen’s Unsecurity
More on Security
This is one of a series on Security in DevSecOps:
- Git Signing
- WebGoat known insecure PHP app and vulnerability scanners
- AWS Security (certification exam)
- Cyber Security
- Security certifications