Certified Cloud Security Professional (CCSP)

Skip to Schedule / Outline
5 days - $4,549

The (ISC)²® Certified Cloud Security Professional (CCSP) course is aimed at professionals looking to apply security measures in cloud-based environments. The certification is an industry-recognized credential that demonstrates to employers an individual’s knowledge of the technologies and processes involved in the secure development and deployment of cloud applications.
The course teaches students the essential concepts and skills of cloud security and how to protect their data and code from the many threats present in today’s cloud-based environments. The comprehensive course covers topics such as cryptography, identity and access management, encryption, authentication, risk management, legal considerations, security monitoring and more.

This Course is for…

The CCSP course is designed for developers, systems administrators, security engineers, and other IT/security professionals who are responsible for cloud security operations, secure development, and secure deployment of cloud applications

Schedule / Enroll

StartsTimePriceEnroll
  • Course Outline
  • Objectives
  • 1 – Architectural Concepts & Design Requirements

    • Understand Cloud Computing Concepts
    • Describe Cloud Reference Architecture
    • Understand Security Concepts Relevant to Cloud Computing
    • Understand Design Principles of Secure Cloud Computing
    • Identify Trusted Cloud Services

    2 – Cloud Data Security

    • Understand Cloud Data Lifecycle
    • Design and Implement Cloud Data Storage Architectures
    • Design and Apply Data Security Strategies
    • Understand and Implement Data Discovery and Classification Technologies
    • Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII)
    • Design and Implement Data Rights Management
    • Plan and Implement Data Retention, Deletion, and Archiving Policies
    • Design and Implement Auditability, Traceability and Accountability of Data Events

    3 – Cloud Platform & Infrastructure Security

    • Comprehend Cloud Infrastructure Components
    • Analyze Risks Associated to Cloud Infrastructure
    • Design and Plan Security Controls
    • Plan Disaster Recovery and Business Continuity Management

    4 – Cloud Application Security

    • Recognize the need for Training and Awareness in Application Security
    • Understand Cloud Software Assurance and Validation
    • Use Verified Secure Software
    • Comprehend the Software Development Life-Cycle (SDLC) Process
    • Apply the Secure Software Development Life-Cycle
    • Comprehend the Specifics of Cloud Application Architecture
    • Design Appropriate Identity and Access Management (IAM) Solutions

    5 – Operations

    • Implement and Build Physical Infrastructure for Cloud Environment
    • Run Physical Infrastructure for Cloud Environment
    • Manage Physical Infrastructure for Cloud Environment
    • Logical Infrastructure for Cloud Environment
    • Run Logical Infrastructure for Cloud Environment
    • Manage Logical Infrastructure for Cloud Environment
    • Ensure Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1)
    • Conduct Risk Assessment to Logical and Physical Infrastructure
    • Understand the Collection, Acquisition and Preservation of Digital Evidence
    • Manage Communication with Relevant Parties

    6 – Legal & Compliance

    • Understand Legal Requirements and Unique Risks within the Cloud Environmen
    • Understand Privacy Issues, Including Jurisdictional Variation
    • Understand Audit Process, Methodologies, and Required Adaption’s for a Cloud Environment
    • Understand Implications of Cloud to Enterprise Risk Management
    • Understand Outsourcing and Cloud Contract Design
    • Execute Vendor Management
  • Gain an advanced understanding of the application of cloud security principles, techniques and tools to secure cloud-based environments.
    Master strategies to design, configure and deploy security controls in cloud environments, and how to monitor and auditing of cloud-based architecture.
    Learn how to protect organizations against cyber threats and security breaches in accordance with applicable laws and regulations.
    Learn best practices for responding to and resolving incidents related to cloud security.
    Master security implications of various migrations and deployment models and strategies to secure the cloud.
    Understand the application of cryptographic concepts and technologies in cloud platforms, as well as the impacts of different types of encryption on the cloud environment.
    Review cloud data protection services and strategies for designing an effective cloud security architecture.
    Understand the risk management process for cloud services and cloud-service providers, and understand the implications of data sovereigntyin in the cloud.
    Learn the importance of identity, access and authentication management, and how to integrate these concepts into the cloud security architecture.
    Gain hands-on experience configuring and deploying common cloud security tools.