Review of the major Cloud concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.

This MindMap review covers:
0:00 Introduction
0:29 Cloud Computing
1:17 Three Service Models
1:23 Infrastructure as a Service (IssS)
1:44 Platform as a Service (PaaS)
2:00 Software as a Service (SaaS)
2:08 Different Service Models
2:33 Levels of Responsibility (Diagram)
3:42 Public Cloud Deployment Model
3:57 Private Cloud Deployment Model
4:26 Community Cloud Deployment Model
4:38 Hybrid Cloud Deployment Model
4:57 Cloud Identification/Authentication/Authorization
5:54 Identity Provider
6:31 Cloud Identity
6:38 Linked Identity
6:52 Synched Identity
7:10 Federated Identity
7:19 Protocols regarding Identification/ Authentication/Authorization
7:25 SPML Protocol
7:47 Federated Access Protocols
7:57 SAML Protocol
8:10 OpenID Protocol
8:14 OAuth Protocol
8:27 Accountability in Cloud
9:00 Responsibility in Cloud
9:14 Cloud Consumer
9:26 Cloud Owner/Controller
9:50 Cloud Provider/Processor
10:07 Cloud Broker
10:43 Hypervisor (VM Monitor)
11:14 Virtual Machine (VM Machine)
11:30 Cloud Migration
11:48 Data-Centric view of Security
12:07 Service Level Agreement (SLA)
12:30 Cloud Investigation
12:57 Data Destruction
13:42 Outro



Other MindMaps:

Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI

Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I

Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU

Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M

Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY

Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E

Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw

CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: [email protected]

#CISSPDomain3Review #MindMap