Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CCSP Certification Prep Course

Gain core knowledge and experience in cloud security architecture, design, operations, and service orchestration in this official (ISC)2 CCSP course

GK# 2364

Course Overview

TOP

This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK®). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.

This five-day program is comprised of a total of six domains and includes:

  • Official (ISC)2 CCSP Training Handbook
  • Official (ISC)2 CCSP Flash Cards
  • CCSP Certification Exam Voucher

Certification:

CCSP - Certified Cloud Security Professional

What You'll Learn

TOP

In-depth coverage of the six domains required to pass the CCSP exam:

  1. Architectural concepts and design requirements
  2. Cloud data security
  3. Cloud platform and infrastructure security
  4. Cloud application security
  5. Operations
  6. Legal and compliance

Outline

TOP
Viewing outline for:

Classroom Live Outline

1. Architecture Concepts and Design Requirements

  • Cloud Computing Concepts
  • Cloud Reference Architecture
  • Security Concepts Relevant to Cloud Computing
  • Design Principles of Secure Cloud Computing
  • Trusted Cloud Services

2. Cloud Data Security

  • Cloud Data Lifecycle
  • Design and Implement Cloud Data Storage Architectures
  • Design and Apply Data Security Strategies
  • and Implement Data Discovery and Classification Technologies
  • Design and Implement Data Rights Management
  • Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PIN)
  • Plan and Implement Data Retention, Deletion, and Archiving Policies
  • Design and Implement Auditability, Traceability, and Accountability of Data Events

3. Cloud Platform and Infrastructure Security

  • Cloud Infrastructure Components
  • Risks Associated to Cloud Infrastructure
  • Design and Plan Security Controls
  • Plan Disaster Recovery and Business Continuity Management

4. Cloud Application Security

  • Need for Training and Awareness in Application Security
  • Cloud Software Assurance and Validation
  • Use Verified Secure Software
  • Software Development Life-Cycle (SDLC) Process
  • Apply the Software Development Life-Cycle
  • Specifics of Cloud Application Architecture
  • Design Appropriate Identity and Access Management (IAM) Solutions
5. Operations
  • Support the Planning Process for the Data Center Design
  • Implement and Build Physical Infrastructure for Cloud Environment
  • Run Physical Infrastructure for Cloud Environment
  • Manage Physical Infrastructure for Cloud Environment
  • Build Logical Infrastructure for Cloud Environment
  • Run Logical Infrastructure for Cloud Environment
  • Manage Logical Infrastructure for Cloud Environment
  • Ensure Compliance with Regulations and Controls (ITIL, ISO/IEC 20000-I)
  • Conduct Risk Assessment to Logical and Physical Infrastructure
  • Collection, Acquisition, and Preservation of Digital Evidence
  • Manage Communication with Relevant Parties

6. Legal and Compliance

  • Legal Requirements and Unique Risks within the Cloud Environment
  • Privacy Issues, Including Jurisdictional Variation
  • Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
  • Implications of Cloud to Enterprise Risk Management
  • Outsourcing and Cloud Contract Design
  • Execute Vendor Management

Prerequisites

TOP
  • Experienced information security professionals with at least five years of IT experience, including three years of information security and at least one year of cloud security experience.

Who Should Attend

TOP
  • Anyone whose position requires CCSP certification
  • Individuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 5 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

Request this course in a different delivery format.
Enroll