CCSP Examination Preparation Course
Design and Tailor this course
As per your team needs
Certified Cloud Security Professional (CCSP) is one of the industry’s premier cloud security certifications offered by (ISC)2 CBK. The CCSP is ideal for IT and information security leaders seeking to prove their understanding of cybersecurity and securing critical assets in the cloud. It shows you have the advanced technical skills and knowledge to design, manage and secure data, applications, and infrastructure in the cloud. CCSP certification is a proven way to build your career and better secure critical assets in the cloud.
This course covers the complete curriculum of CCSP and aims to provide you knowledge and skills across six domains of practice related to cloud security, codified in the (ISC)2 CCSP Common Body of Knowledge (CBK).
This course on CCSP allows you to gain in-depth understanding of the security related advantages and challenges of moving to the cloud. This course enables you to apply knowledge to numerous cloud projects along with detailed understanding of cloud service categories and deployment methods.
- Information Security Professionals
- Cloud Practitioners
- Cloud Security Practitioners
- IT Consultants
- IT Architects
- IT Engineers, Software Engineers, Testers etc. who are looking to change their current career domain and exploring options in Cloud Security
Understanding cloud computing begins with the building blocks of cloud services, and the Cloud Concepts, Architecture, and Design domain introduces these foundational concepts.
- Understand Cloud Computing Concepts
- Describe Cloud Reference Architecture
- Understand Security Concepts Relevant to Cloud Computing
- Understand Design Principles of Secure Cloud Computing
- Describe Cloud Reference Architecture
Information security is fundamentally concerned with preserving the confidentiality, integrity, and availability of data. Although Cloud Data Security domain does introduce new concepts like the cloud data lifecycle, as well as cloud-specific considerations like data dispersion and loss of physical control over storage media that requires unique approaches to data disposal.
- Describe Cloud Data Concepts
- Design and Implement Cloud Data Storage Architectures
- Design and Apply Data Security Technologies and Strategies
- Implement Data Discovery
- Implement Data Classification
- Design and Implement Information Rights Management (IRM)
- Plan and Implement Data Retention, Deletion and Archiving Policies
- Design and Implement Auditability, Traceability and Accountability of Data Events
Cloud security practitioners are required to learn about how to design, deploy, and maintain both physically and logically secure environments.
- Comprehend Cloud Infrastructure Components
- Design a Secure Data Center
- Analyze Risks Associated with Cloud Infrastructure
- Design and Plan Security Controls
- Plan Disaster Recovery (DR) and Business Continuity (BC)
Cloud Application Security domain presents key requirements for recognizing the benefits offered by cloud applications without introducing unacceptable risks.
- Advocate Training and Awareness for Application Security
- Describe the Secure Software Development Life Cycle (SDLC) Process
- Apply the Secure Software Development Life Cycle (SDLC)
- Apply Cloud Software Assurance and Validation
- Use Verified Secure Software
- Comprehend the Specifics of Cloud Application Architecture
- Design Appropriate Identity and Access Management (IAM) Solutions
The Cloud Security Operations domain deals with issues of implementing, building, operating, and managing the physical and logical infrastructure needed for a cloud environment
- Implement and Build Physical and Logical Infrastructure for Cloud Environment
- Operate Physical and Logical Infrastructure for Cloud Environment
- Manage Physical and Logical Infrastructure for Cloud Environment
- Implement Operational Controls and Standards
- Information Technology Infrastructure Library (ITIL)
- ISO 20000 etc.
- Support Digital Forensics
- Manage Communication with Relevant Parties
- Manage Security Operations
Legal and regulatory requirements are a significant driver of the work many information security professionals perform, and cloud computing makes this increasingly more complex due to its inherently global nature.
- Articulate Legal Requirements and Unique Risks within the Cloud Environment
- Understand Privacy Issues
- Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
- Understand Implications of Cloud to Enterprise Risk Management
- Understand Outsourcing and Cloud Contract Design
- Understanding on IT Infrastructure, basics of software development life cycle and networking terminologies.
- Having some knowledge about Cloud Architecture is an advantage for this course, however that is not mandatory, the first module will cover all cloud concepts “Cloud Concepts, Architecture and Design”.