Certified Cloud Security Professional (CCSP)

5 Day | Instructor Led

This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK®). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.

Inquire About
Certified Cloud Security Professional (CCSP)

Ideal Candidates for Certified Cloud Security Professional (CCSP) Class

Anyone whose position requires CCSP certification
Individuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services

Certified Cloud Security Professional (CCSP) Prerequisites

Experienced information security professionals with at least five years of IT experience, including three years of information security and at least one year of cloud security experience.

What You'll Get in Certified Cloud Security Professional (CCSP)

What You'll Learn in Certified Cloud Security Professional (CCSP)

In-depth coverage of the six domains required to pass the CCSP exam:

Architectural concepts and design requirements
Cloud data security
Cloud platform and infrastructure security
Cloud application security
Operations
Legal and compliance

Certified Cloud Security Professional (CCSP) Certification

CCSP Certification

Certified Cloud Security Professional (CCSP) Outline

1. Architecture Concepts and Design Requirements

  • Cloud Computing Concepts
  • Cloud Reference Architecture
  • Security Concepts Relevant to Cloud Computing
  • Design Principles of Secure Cloud Computing
  • Trusted Cloud Services

2. Cloud Data Security

  • Cloud Data Lifecycle
  • Design and Implement Cloud Data Storage Architectures
  • Design and Apply Data Security Strategies
  • and Implement Data Discovery and Classification Technologies
  • Design and Implement Data Rights Management
  • Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PIN)
  • Plan and Implement Data Retention, Deletion, and Archiving Policies
  • Design and Implement Auditability, Traceability, and Accountability of Data Events

3. Cloud Platform and Infrastructure Security

  • Cloud Infrastructure Components
  • Risks Associated to Cloud Infrastructure
  • Design and Plan Security Controls
  • Plan Disaster Recovery and Business Continuity Management

4. Cloud Application Security

  • Need for Training and Awareness in Application Security
  • Cloud Software Assurance and Validation
  • Use Verified Secure Software
  • Software Development Life-Cycle (SDLC) Process
  • Apply the Software Development Life-Cycle
  • Specifics of Cloud Application Architecture
  • Design Appropriate Identity and Access Management (IAM) Solutions
5. Operations
  • Support the Planning Process for the Data Center Design
  • Implement and Build Physical Infrastructure for Cloud Environment
  • Run Physical Infrastructure for Cloud Environment
  • Manage Physical Infrastructure for Cloud Environment
  • Build Logical Infrastructure for Cloud Environment
  • Run Logical Infrastructure for Cloud Environment
  • Manage Logical Infrastructure for Cloud Environment
  • Ensure Compliance with Regulations and Controls (ITIL, ISO/IEC 20000-I)
  • Conduct Risk Assessment to Logical and Physical Infrastructure
  • Collection, Acquisition, and Preservation of Digital Evidence
  • Manage Communication with Relevant Parties

6. Legal and Compliance

  • Legal Requirements and Unique Risks within the Cloud Environment
  • Privacy Issues, Including Jurisdictional Variation
  • Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
  • Implications of Cloud to Enterprise Risk Management
  • Outsourcing and Cloud Contract Design
  • Execute Vendor Management

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

If you are ready to take your security career to the next level, Ultimate Knowledge's Certified Information Systems Security Professional (CISSP) training and certification boot camp will help get you there. You will receive instruction from our experts who possess in-depth, real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Our comprehensive CISSP exam prep tools contain the industry's most relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with our CISSP training and certification custom course material, you will receive a free copy of Shon Harris' CISSP Certification All-in-One Exam Guide, 5th Edition and a CISSP Practice Exams Book (All-in-One).



CISSP Information Systems Security Architecture Professional (ISSAP)



This course is designed for CISSPs who specialize in deep managerial elements, such as project management, risk management, setting up and delivering a security awareness program, and managing a business continuity planning program. Gain security leadership and management skills in order to manage an organizations information security program. Ensure your company meets security compliance regulations by establishing, managing, and overseeing a process to help monitor, assess and enforce compliance with security policies and procedures. Learn vital contingency and incident management practices for reducing the impact of adverse events, such as natural and man-made disasters, virus outbreak, or equipment failure



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W