Top of Page
 

CCSP Training Course Outline

Cloud Security

The Official (ISC)² CCSP training provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam. Taught by an (ISC)²-authorized instructor, the course features:

  • Official (ISC)² courseware
  • Flash Cards
  • Post-course assessment
  • Collaboration with classmates
    not currently available for self-paced course
  • Real-world learning activities and scenarios

Who Should Attend

The training seminar is ideal for those working in positions such as but not limited to:

  • Enterprise Architect
  • Security Administrator
  • Systems Engineer
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Manager
  • Systems Architect
 

Course Agenda

  • Domain 1: Architectural Concepts & Design Requirements
  • Domain 2: Cloud Data Security
  • Domain 3: Cloud Platform & Infrastructure Security
  • Domain 4: Cloud Application Security
  • Domain 5: Operations
  • Domain 6: Legal & Compliance

Course Delivery Methods

Classroom-based

Classroom-Based >

Online Instructor-Ied

Online Instructor-Led >

Online Self-Paced

Online Self-Paced >

Private Onsite

Private On-Site >

 

Course Objectives

After completing this course, the student will be able to:

  • Describe the physical and virtual components of and identify the principle technologies of cloud based systems
  • Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments
  • Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
  • Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture
  • Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations
  • Contrast between forensic analysis in corporate data center and cloud computing environments
  • Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing
  • Identify and explain the six phases of the data lifecycle
  • Explain strategies for protecting data at rest and data in motion
  • Describe the role of encryption in protecting data and specific strategies for key management
  • Compare a variety of cloud-based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements
  • Contrast security aspects of Software Development Lifecycle (SDLC) in standard data center and cloud computing environments
  • Describe how federated identity and access management solutions mitigate risks in cloud computing systems
  • Conduct gap analysis between baseline and industry-standard best practices
  • Develop Service Level Agreements (SLAs) for cloud computing environments
  • Conduct risk assessments of existing and proposed cloud-based environments
  • State the professional and ethical standards of (ISC)2 and the Certified Cloud Security Professional
OK