CSA CCSK – Protecting data from Un-Authorized Access

Cloud Deployment Model and Security Concerns Hello friends. So welcome to this lecture on cloud deployment model and security concerns. So we have already gone through that there are different models like public cloud, private cloud, hybrid cloud, community cloud and each of the model they are having their different security concerns. From organization perspective, the first point that organization needs to consider is that what are the different compliance or legal requirements they are having and what those requirements say. Let’s say the firewall should be there or some…

CSA CCSK – Protecting data from Un-Authorized Access Part 2

Where to check AWS and MS Audit reports Hello friends. So welcome to this lecture on how to check AWS and Microsoft audit reports. In the last lecture we have already discussed that it is very important to check the effectiveness of the audits. That okay, what kind of audits CSP is doing and is somebody performing the regular audits? What is the frequency? And are different industry specific audit reports being available? Less vendor doing the audit as per the different regulations because different type of customers will be…

CSA CCSK – Legal and Compliance

Information Management Legal Responsibilities Hello friends. So welcome to this lecture on information management legal responsibilities. We need to understand the various legal responsibilities from a provider, from a customer and an end user perspective. So this is it. Like there will be various things we’ll be covering in this legal and compliance lectures. So one thing guys need to make sure that all the materials or the lectures are being used are on the basis of best practice in case of for legal and compliance. So do not consider…

CSA CCSK – Handling Security Incidents with CSP

CSP incident response and Security Notification Hello friends. So welcome to this lecture on CSP Incident Response and security notification. So in this lecture we’ll study that okay, when an incident happens, in case of cloud, what all would be required, because breaches do generally happen on premise or on cloud as well. So in that case, what should be the reaction? What we need to check at the CSP end that okay, whether they have any kind of incident response plan and how do they notify the customer. So…

CSA CCSK – Cloud Assets and Secure Configuration Management

Challenges in Cloud Asset Discovery Hello friends. So welcome to this lecture on challenges in cloud asset discovery. So, in the last section we discussed about cloud service agreement, service level agreement and then acceptable use policy. So this is all about while assessing the cloud service provider and checking the different service provider and looking at, okay, what are the different expectations. Now, once we have moved the data into the cloud, we have provisioned in the servers. Now, the next challenge which comes in terms of in case…

Cisco CCNP Security 300-715 SISE – Web Auth and Guest Services

Lab Demo Configure Guest Access with Guest Self Registration 2 In our last session, we just finished up Portal Behavior and Flow Settings configuration and did a quick summary of the new guest flow based on that new configuration. And now we’ll do some customization. And here we’ll combine a couple of new pieces that we haven’t seen yet, so we can add footer elements and as we can see, that will get added to our preview page. You should see this at the very bottom. All access is flawed….

Cisco CCNP Security 300-715 SISE – ISE Profiler

Introducing Cisco ISE Profiler The Cisco Identity Engine Profiler service is used to identify, locate and determine the capabilities of endpoints or identities which exist in the network. This is important in order to determine the appropriate network access allowed for particular device types. To accomplish this task, the Cisco Ice profiler function uses a sensor which relies on various probes to collect information from the endpoints. The sensor then forwards the data collected to the profile or analyzer within Cisco Ice. The analyzer uses the information and classifies the…

Cisco CCNP Security 300-715 SISE – ISE Profiler Part 2

Verification for NAD Configuration for Profiling Hello. In this video, we will walk through verifying the profiling configuration on our pods, virtual Wireless LAN controller, and three k access switch. We’ll start by opening a new browser tab and then going to the web console of the Wireless LAN controller. I already have a bookmark on my browser that I can click on to go to that URL. I’ll log in to the Wireless Lancontroller with the correct credential that I’ve already saved on my PC. Once I’m logged in…

Cisco CCNP Security 300-715 SISE – Cisco ISE BYOD

Introducing the Cisco ISE BYOD Process Organizations that have accepted a Bringyourown device or BYOD policy have observed improved user experiences and productivity, as well as simplified operations and reduced risk. However, many organizations are still reluctant to implement BYOD out of security concerns. The problem is that BYOD introduces previously unmanaged devices into the network, and their access to internal resources must be controlled. This is where a Cisco Identity Services engine, or Ice can be used to create different policy levels. Not all guests to the network should…

ISACA CRISC – IT Risk Identification

How can the risk professional avoid being seen as obstructive? Risk management depends on the goals and objectives of the business. The risk professional should take care not to consider a risk only from the perspective of a department or process without also considering the risk to other departments, partners, or general business objectives. Because risk management serves the organisation as a whole, executives will often choose a path that seems to offer the best perspective for value creation and can do so despite the resistance of those involved in…

img