Certified Cloud Security Professional

Overview:

Prove You’re on the Forefront of Cloud Security

In the ever-changing world of the cloud, you face unique security challenges every day — from new threats to sensitive data, to uneducated internal teams. Take command with the CCSP: the premier cloud security certification.The CCSP is a global credential that represents the highest standard for cloud security expertise. It was co-created by (ISC)² and Cloud Security Alliance — leading stewards for information security and cloud computing security.When you earn this cloud security certification, you prove you have deep knowledge and hands-on experience with cloud security architecture, design, operations and service orchestration. Start earning your CCSP today.


This training seminar provides a comprehensive review of cloud security concepts and industry best practices, covering the 6 domains of the CCSP CBK:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories. This training course will help candidates review and refresh their cloud security knowledge and help

identify areas they need to study for the CCSP exam and features:

  • Official (ISC)² courseware
  • Taught by an international instructor
  • Student handbook
  • Collaboration with classmates
  • Real-world learning activities and scenarios

You Will Learn How To:

  • Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
  • Differentiate between various as-a-service delivery models and frameworks that are incorporated into the cloud computing reference architecture
  • Explain strategies for protecting data at rest and data in motion
  • Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies, and working with authorities during legal investigations
  • Contrast between forensic analysis in corporate data center and cloud computing environments

Requirements:

  • Five years of cumulative, full-time working experience in IT (three of which must be in information security, and one of which must be in one of the six CCSP CBK domains)
  • Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification

Course Preparation:

  • You will be asked to read documents before the course that will help with your learning and exam preparation

Course Outline

Architectural Concepts and Designs Requirements

  • Reviewing cloud computing concepts
  • Describing cloud reference architecture
  • Security concepts relevant to cloud computing
  • Design principles of secure cloud computing
  • Identifying trusted cloud services

Cloud Data Security

  • Understanding cloud data lifecycle
  • Designing and implementing cloud data storage architectures
  • Designing and applying data security strategies
  • Understanding and implementing data discovery and classification technologies
  • Designing and implementing relevant jurisdictional data protections for personally identifiable information

Cloud Platform and Infrastructure Security

  • Comprehending cloud infrastructure components
  • Analyzing risks associated to cloud infrastructure
  • Designing and planning security controls
  • Planning disaster recovery and business continuity management

Cloud Application Security

  • Recognizing the need for training and awareness in application security
  • Understanding cloud software assurance and validation
  • Using verified secure software
  • Comprehending the Software Development Life-Cycle (SDLC) process
  • Applying the Secure Software Development Life-Cycle

Operations

  • Supporting the planning process for the data center design
  • Implementing and building physical infrastructure for cloud environment
  • Running physical infrastructure for cloud environment
  • Managing physical infrastructure for cloud environment
  • Building logical infrastructure for cloud environment

Legal and Compliance

  • Legal requirements and unique risks within the cloud environment
  • Privacy issues, including jurisdictional variation
  • The audit process, methodologies, and required adaptions for a cloud environment
  • Implications of cloud to enterprise risk management
  • Outsourcing and cloud contract design