CCSP : Certified Cloud Security Professional (CCSP)
  • Overview
  • Course Outline
  • What is included
  • Schedule
  • Testimonials
  • View Comments

Securing the Power of the Cloud:

As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSPs.

Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure. 

Who should obtain the CCSP credential?

The CCSP credential is designed for mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing.

CCSP is most appropriate for those whose day-to-day responsibilities involve procuring, securing and managing cloud environments or purchased cloud services. In other words, CCSPs are heavily involved with the cloud. Many CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration. 

Example job functions include, but are not limited to:

  • Enterprise Architect
  • Security Administrator
  • Systems Engineer
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Manager
  • Systems Architect

Globally Recognized Proficiency in Cloud Security:

CCSP is a global credential born from the expertise of the two industry-leading stewards of information systems and cloud computing security, (ISC)² and CSA. The CCSP credential is appropriate and applicable to cloud security in a global environment. This is especially important given the legal, regulatory and compliance concerns that come with multi-jurisdictional housing of personally identifiable information (PII).

For those who qualify, the CCSP exam will test their competence in the six CCSP domains of the (ISC)² Common Body of Knowledge (CBK), which cover:

  • Architectural Concepts and Design Requirements
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal and Compliance

CCSP Course Overview

This training provides a comprehensive review of cloud security concepts and industry best practices, covering the 6 domains of the CCSP:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance
Audience

The CCSP credential is designed for experienced information security professionals with at least five years of full-time IT experience, including three years of information security and at least one year of cloud security experience. The CCSP credential is suitable for mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing.

CCSP is most appropriate for those whose day-to-day responsibilities involve procuring, securing and managing cloud environments or purchased cloud services. In other words, CCSPs are heavily involved with the cloud. Many CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.

Exams Covered
Course Prerequisite

After completing this course, you will be able to:

  • Describe the physical and virtual components of and identify the principle technologies of cloud based systems.
  • Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments.
  • Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing.
  • Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture.
  • Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations.
  • Contrast between forensic analysis in corporate data center and cloud computing environments.
  • Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing.
  • Identify and explain the six phases of the data lifecycle.
  • Explain strategies for protecting data at rest and data in motion.
  • Describe the role of encryption in protecting data and specific strategies for key management.
  • Compare a variety of cloud based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements.
  • Contrast security aspects of Software Development Life Cycle in standard data center and cloud computing environments.
  • Describe how federated identity and access management solutions mitigate risks in cloud computing systems.
  • Conduct gap analysis between baseline and industry standard best practices.
  • Develop Service Level Agreements (SLA) for cloud computing environments.
  • Conduct risk assessments of existing and proposed cloud-based environments.
  • State the professional and ethical standards of (ISC)² and the Certified Cloud Security Professional.

Domain 1: Architectural Concepts and Design Requirements 

  • Understand Cloud Computing Concepts
  • Describe Cloud Reference Architecture
  • Understand Security Concepts Relevant to Cloud Computing
  • Understand Design Principles of Secure Cloud Computing
  • Identify Trusted Cloud Services

Domain 2: Cloud Data Security 

  • Understand Cloud Data Lifecycle
  • Design and Implement Cloud Data Storage Architectures
  • Design and Apply Data Security Strategies
  • Understand and Implement Data Discovery and Classification Technologies
  • Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII)
  • Design and Implement Data Rights Management
  • Plan and Implement Data Retention, Deletion, and Archiving Policies
  • Design and Implement Auditability, Traceability and Accountability of Data Events

Domain 3: Cloud Platform and Infrastructure Security

  • Comprehend Cloud Infrastructure Components
  • Analyze Risks Associated to Cloud Infrastructure
  • Design and Plan Security Controls
  • Plan Disaster Recovery and Business Continuity Management

Domain 4: Cloud Application Security 

  • Recognize the need for Training and Awareness in Application Security
  • Understand Cloud Software Assurance and Validation
  • Use Verified Secure Software
  • Comprehend the Software Development Life-Cycle (SDLC) Process
  • Apply the Secure Software Development Life-Cycle
  • Comprehend the Specifics of Cloud Application Architecture
  • Design Appropriate Identity and Access Management (IAM) Solutions

Domain 5: Operations 

  • Support the Planning Process for the Data Center Design
  • Implement and Build Physical Infrastructure for Cloud Environment
  • Run Physical Infrastructure for Cloud Environment
  • Manage Physical Infrastructure for Cloud Environment
  • Build Logical Infrastructure for Cloud Environment
  • Run Logical Infrastructure for Cloud Environment
  • Manage Logical Infrastructure for Cloud Environment
  • Ensure Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1)
  • Conduct Risk Assessment to Logical and Physical Infrastructure
  • Understand the Collection, Acquisition and Preservation of Digital Evidence
  • Manage Communication with Relevant Parties

Domain 6: Legal and Compliance 

  • Understand Legal Requirements and Unique Risks within the Cloud Environment
  • Understand Privacy Issues, Including Jurisdictional Variation
  • Understand Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
  • Understand Implications of Cloud to Enterprise Risk Management
  • Understand Outsourcing and Cloud Contract Design
  • Execute Vendor Management
LOCATION START END TIME ENROLL