Certified Cloud Security Professional (CCSP)

 

Course Overview

Led by an ISC2 authorized instructor, this training seminar provides a comprehensive review of cloud security concepts and industry best practices, covering the 6 domains of the CCSP CBK:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

Who should attend

The CCSP credential is designed for experienced information security professionals with at least five years of full-time IT experience, including three years of information security and at least one year of cloud security experience. The CCSP credential is suitable for mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing.

CCSP is most appropriate for those whose day-to-day responsibilities involve procuring, securing and managing cloud environments or purchased cloud services. In other words, CCSPs are heavily involved with the cloud. Many CCSPs will be responsible for cloud security architecture, design, operations, and/or service orchestration.

Course Objectives

After completing this course, you will be able to:

  • Describe the physical and virtual components of and identify the principle technologies of cloud based systems.
  • Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments.
  • Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing.
  • Differentiate between various as a Service delivery models and frameworks that are incorporated into the cloud computing reference architecture.
  • Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations.
  • Contrast between forensic analysis in corporate data center and cloud computing environments.
  • Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing.
  • Identify and explain the six phases of the data lifecycle.
  • Explain strategies for protecting data at rest and data in motion.
  • Describe the role of encryption in protecting data and specific strategies for key management.
  • Compare a variety of cloud based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements.
  • Contrast security aspects of Software Development Life Cycle in standard data center and cloud computing environments.
  • Describe how federated identity and access management solutions mitigate risks in cloud computing systems.
  • Conduct gap analysis between baseline and industry standard best practices.
  • Develop Service Level Agreements (SLA) for cloud computing environments.
  • Conduct risk assessments of existing and proposed cloud-based environments.
  • State the professional and ethical standards of ISC2 and the Certified Cloud Security Professional.

Course Content

This training course will help candidates review and refresh their cloud security knowledge and help identify areas they need to study for the CCSP exam and features:

  • Official ISC2 courseware
  • Taught by an authorized ISC2 instructor
  • Student Guide in electronic format
  • Interactive Online Flash Cards
  • Post-course Assessment
  • Collaboration with classmates
  • Real-world learning activities and scenarios

Prices & Delivery methods

Classroom Training
Modality: C

Duration 5 days

Price
  • Eastern Europe: 3,950.— €

Schedule

English

Time zone: Central European Time (CET)

Online Training This is a FLEX course. Time zone: Central European Time (CET)
Online Training This is a FLEX course. Time zone: Central European Time (CET)

6 hours difference

Online Training Time zone: Eastern Standard Time (EST)
Online Training Time zone: Eastern Standard Time (EST)
Online Training Time zone: Eastern Standard Time (EST)
Online Training Time zone: Eastern Daylight Time (EDT)
Online Training Time zone: Eastern Daylight Time (EDT)

7 hours difference

Online Training Time zone: Central Daylight Time (CDT)
Online Training Time zone: Central Daylight Time (CDT)

9 hours difference

Online Training Time zone: Pacific Daylight Time (PDT)
Online Training Time zone: Pacific Daylight Time (PDT)
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.
This is a FLEX course, which is delivered both virtually and in the classroom. All FLEX courses are also Instructor-led Online Trainings (ILO).

Europe

Netherlands

Den Haag This is a FLEX course.   Time zone: Central European Time (CET) Enroll:
for online training
for classroom training
Den Haag This is a FLEX course.   Time zone: Central European Time (CET) Enroll:
for online training
for classroom training
This is a FLEX course, which is delivered both virtually and in the classroom. All FLEX courses are also Instructor-led Online Trainings (ILO).