Course Description

  • What are the course objectives?

    Simplilearn’s CCSP online training certification course will help you gain expertise in cloud security architecture, design, applications, and operations. CCSP by (ISC)² is a globally recognized certification and the highest standard for cloud security. This course provides step-by-step guidance and an easy-to-follow detailed lesson plan regarding every facet of CCSP so that you will be ready to accelerate your career in cloud security.
     

  • What skills will you learn?

    Upon completion of Simplilearn’s CCSP certification course, you will be able to:

    • Understand fundamental Cloud Computing concepts, architecture, and design
    • Comprehend cloud data security concepts including data lifecycle and storage architectures 
    • Explore the design principles of secure Cloud Computing
    • Plan disaster recovery and business continuity
    • Configure virtual machine tools
    • Perform risk analysis, mitigation, and management
    • Comprehend and practice legal risk and cloud compliance

  • Who should take this course?

    This online CCSP certification course is ideal for anyone wishing to learn and explore career opportunities in IT Network Security and Cloud Computing. Having experience in information security, risk, and compliance, security engineering, governance, IT auditing or IT architecture, VMware virtualization, networking is a plus but not required. Those with a technical understanding such as recent graduates will also excel in this course. The course is ideal for the following job roles:

    • Enterprise Architect
    • Security Administrator
    • Systems Engineer
    • Security Architect
    • Security Consultant
    • Security Engineer
    • Security Manager
    • Systems Architect

  • What are the career benefits of this course?

    CCSP is the highest standard for cloud security. A vendor-neutral, American National Standards Institute (ANSI) accredited certification, you can apply it to any of the popular cloud platforms helping you become an expert on cloud security. Spending on the Cloud Computing infrastructure is expected to grow at least 6.5 times annually through 2020 and the demand for cloud-related services will continue to grow at least by 22% per year through 2020 and will have a market cap of $236 billion by 2020. Amazon, Cloudera, Microsoft, Google are among the top companies hiring CCSP professionals. The annual average salary of a Principal Information Security Professional ranges from $135,000  –  $190,000 (Source: Glassdoor).
     

Course Preview

    • Lesson 1 - Course Introduction

      11:16
      • 1.1 CCSP Certification Overview
        08:28
      • 1.2 Course Objectives
        02:48
    • Lesson 2 - Cloud Concepts, Architecture, and Design

      1:13:29
      • 1.01 Cloud Concepts, Architecture, and Design
        01:08
      • 1.02 Security Concepts
        02:41
      • 1.03 Key Security Concepts, Defense in Depth, Due Care, and Due Dilligence
        02:48
      • 1.04 Security Controls and Functionalities
        02:43
      • 1.05 Cloud Computing Concepts
        00:45
      • 1.06 Business Drivers
        01:13
      • 1.07 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
        01:27
      • 1.08 Cloud Computing Concepts Advantages
        01:05
      • 1.09 Cloud Reference Architecture
        00:55
      • 1.10 Cloud Computing Roles and Actors
        01:25
      • 1.11 Cloud Service Categories Infrastructure as a Service (IaaS)
        04:15
      • 1.12 Cloud Service Categories Platform as a Service (PaaS)
        04:21
      • 1.13 Cloud Service Categories Software as a Service (SaaS)
        03:31
      • 1.14 Cloud Service Categories Management
        01:03
      • 1.15 Cloud Deployment Models: Public Cloud
        00:47
      • 1.16 Cloud Deployment Models: Private Cloud
        00:53
      • 1.17 Cloud Deployment Models: Hybrid Cloud
        00:53
      • 1.18 Cloud Deployment Models: Community Cloud
        00:55
      • 1.19 Models and Characteristics
        01:13
      • 1.20 Comparison of Cloud Deployment Models
        00:35
      • 1.21 Case Study: Hybrid Cloud
        01:32
      • 1.22 Cloud Technology Roadmap
        04:07
      • 1.23 Impact of Related Technologies
        06:46
      • 1.24 Cryptography
        02:36
      • 1.25 Key Management
        01:06
      • 1.26 IAM and Access Control
        02:12
      • 1.27 Data Remanence
        01:00
      • 1.28 Virtualization
        03:02
      • 1.29 Common Threats
        03:42
      • 1.30 Design Principles of Secure Cloud Computing
        02:05
      • 1.31 Cost-Benefit Analysis
        00:33
      • 1.32 Evaluate Cloud Service Providers
        02:46
      • 1.33 SOC
        00:38
      • 1.34 IT Security Evaluation
        01:28
      • 1.35 FIPS
        02:14
      • 1.36 Scenario
        02:17
      • 1.37 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 3 - Cloud Data Security

      1:21:15
      • 2.01 Cloud Data Security
        01:07
      • 2.02 Cloud Data Life Cycle
        01:06
      • 2.03 Cloud Data Life Cycle: Create, Store, Use, and Share
        03:29
      • 2.04 Real-World Scenario
        01:28
      • 2.05 Cloud Data Life Cycle: Archive
        02:10
      • 2.06 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
        02:38
      • 2.07 Cloud Data Storage Architectures
        00:57
      • 2.08 Cloud Data Storage Architectures: Storage Types for IaaS
        00:56
      • 2.09 Cloud Data Storage Architectures: Storage Types for PaaS
        01:03
      • 2.10 Cloud Data Storage Architectures: Storage Types for SaaS
        01:26
      • 2.11 Cloud Data Storage Architectures: Threats to Storage Types
        02:23
      • 2.12 Real-World Scenario
        00:55
      • 2.13 Data Security Strategies
        00:44
      • 2.14 Data Security Strategies: Encryption (Use Cases)
        01:13
      • 2.15 Data Security Strategies: Encryption Challenges
        02:06
      • 2.16 Data Security Strategies: Encryption in IaaS
        02:33
      • 2.17 Data Security Strategies: Database Encryption
        01:21
      • 2.18 Data Security Strategies: Key Management
        02:02
      • 2.19 Data Security Strategies: Key Storage in the Cloud
        01:25
      • 2.20 Data Security Strategies: Masking
        01:25
      • 2.21 Data Security Strategies: Data Anonymization
        00:48
      • 2.22 Data Security Strategies: Tokenization
        01:32
      • 2.23 Data Security Strategies: Homomorphic Encryption and Bit Splitting
        02:41
      • 2.24 Real-World Scenario
        01:18
      • 2.25 Data Security Strategies: Data Loss Prevention
        03:22
      • 2.26 Scenario
        01:38
      • 2.27 Data Discovery and Classification Technology
        04:14
      • 2.28 Data Discovery and Classification Technology: Data Classification
        01:41
      • 2.29 Data Discovery and Classification Technology: Challenges With Cloud Data
        01:20
      • 2.30 Jurisdictional Data Protections for Personally Identifiable Information (PII)
        01:34
      • 2.31 Privacy Acts: GDPR
        04:07
      • 2.32 Privacy Acts: GDPR Data Protection Principles
        03:09
      • 2.33 Privacy Acts: United States
        01:00
      • 2.34 Privacy Acts: HIPAA, FISMA, and SOX
        02:21
      • 2.35 Jurisdictional Data Protections for PII: Responsibilites of Cloud Services
        01:31
      • 2.36 Data Rights Management
        03:33
      • 2.37 Data Retention, Deletion, and Archiving Policies
        00:27
      • 2.38 Data Retention
        00:29
      • 2.39 Data Deletion
        01:21
      • 2.40 Real-World Scenario
        01:27
      • 2.41 Data Archiving
        00:38
      • 2.42 Real-World Scenario
        01:00
      • 2.43 Legal Hold
        01:00
      • 2.44 Auditability, Traceability, and Accountability of Data Events
        01:07
      • 2.45 SIEM
        02:36
      • 2.46 Chain of Custody
        00:39
      • 2.47 Nonrepudation
        00:25
      • 2.48 Real-World Scenario
        01:01
      • 2.49 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 4 - Cloud Platform and Infrastructure Security

      56:14
      • 3.01 Cloud Platform and Infrastructure Security
        01:04
      • 3.02 Cloud Infrastructure Components
        01:22
      • 3.03 Network and Communications
        02:10
      • 3.04 Management Plane and Virtualization
        01:07
      • 3.05 Factors That Impact Data Center Design
        01:53
      • 3.06 Physical Design: Buy or Build
        00:47
      • 3.07 Physical Design: Data Center Design Standards
        02:02
      • 3.08 Physical Design: Uptime Institute
        01:00
      • 3.09 Physical Design: Tiers
        03:34
      • 3.10 Physical Design Features of Tiers
        01:03
      • 3.11 Real-World Scenario
        01:03
      • 3.12 Environmental Design Considerations
        02:59
      • 3.13 Connectivity
        00:28
      • 3.14 Hypervisor and Resource Allocation
        01:27
      • 3.15 Risks Associated with Cloud Infrastructure
        00:23
      • 3.16 Policy General and Virtualization Risks
        02:40
      • 3.17 Cloud-Specific Legal and Non-Cloud Specific Risks
        03:04
      • 3.18 Cloud Attack Vectors and Compensating Controls
        01:10
      • 3.19 Business Scenario
        01:29
      • 3.20 Design and Plan Security Controls
        02:13
      • 3.21 Real-World Scenario
        01:09
      • 3.22 Plan Disaster Recovery and Business Continuity
        01:07
      • 3.23 Real-World Scenario
        01:04
      • 3.24 BCDR Planning Factors and Disruptive Events
        00:58
      • 3.25 Characteristics of Cloud Infrastructure
        00:23
      • 3.26 BCDR strategies and Returning to Normal
        01:06
      • 3.27 Real-World Scenario
        01:13
      • 3.28 BCDR Creation
        02:34
      • 3.29 BCDR Creation: Test
        05:11
      • 3.30 Business Requirements
        01:09
      • 3.31 BCDR Creation: Report and Revise
        00:42
      • 3.32 Testing Types, Uptime, Availability, Activity, and Case Study
        03:55
      • 3.33 Security Training and Awareness
        00:48
      • 3.34 Real-World Scenario
        01:23
      • 3.35 Key Takeaways
        00:34
      • Knowledge Check
    • Lesson 5 - Cloud Application Security

      38:19
      • 4.01 Cloud Application Security
        01:25
      • 4.02 Advocate Training and Awareness for Application Security
        02:14
      • 4.03 Real-World Scenario
        00:59
      • 4.04 Common Pitfalls
        02:36
      • 4.05 Encryption Dependency Awareness
        00:40
      • 4.06 Business Scenario
        01:15
      • 4.07 Understanding Software Development Lifecycle Process
        00:34
      • 4.08 Real-World Scenario
        00:57
      • 4.09 Vulnerabilities and Risks
        01:21
      • 4.10 Threat Modeling
        03:36
      • 4.11 Real-World Scenario
        01:34
      • 4.12 Encryption
        02:02
      • 4.13 Sandboxing and Application Virtualization
        01:19
      • 4.14 Federated Identity Management
        02:28
      • 4.15 SAML Authentication
        02:49
      • 4.16 Identity and Access Management
        01:42
      • 4.17 Multi-Factor Authentication
        02:16
      • 4.18 Real-World Scenario
        01:36
      • 4.19 Cloud Access Security Broker
        02:18
      • 4.20 Application Security Testing
        01:32
      • 4.21 Software Supply Chain Management
        01:11
      • 4.22 Real-World Scenario
        01:06
      • 4.23 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 6 - Cloud Security Operations

      1:04:59
      • 5.01 Cloud Security Operations
        01:31
      • 5.02 Secure Configuration of Hardware: Servers
        03:45
      • 5.03 Secure Configuration of Hardware: Storage Controllers
        00:37
      • 5.04 Real-World Scenario
        01:27
      • 5.05 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription
        02:26
      • 5.06 Secure Configuration of Hardware: Virtual Switches
        01:38
      • 5.07 Configuration of VM Tools
        00:49
      • 5.08 Configuration of VM Tools Running a Physical Infrastructure: Legal, Compatibility, Control, and Log Data
        01:35
      • 5.09 Configuration of VM Tools Running a Physical Infrastructure: PCI DSS Access, Upgrades and Changes, and Failover Technology
        01:25
      • 5.10 Configuration of VM Tools Running a Physical Infrastructure: Compliance, Regulations, and Outsourcing
        01:41
      • 5.11 Configuration of VM Tools Running a Physical Infrastructure: Placement of Security, Virtualization, VM
        01:37
      • 5.12 Real-World Scenario
        01:26
      • 5.13 Securing Network Configuration
        04:06
      • 5.14 Real-World Scenario
        01:11
      • 5.15 Clustered Hosts
        01:42
      • 5.16 Dynamic Optimization and Clustered Storage
        01:48
      • 5.17 Maintenance Mode and Patch Management
        03:25
      • 5.18 Performance Monitoring
        01:21
      • 5.19 Real-World Scenario
        01:10
      • 5.20 Network Security Controls: Layered Security and Honeypots
        02:47
      • 5.21 Network Security Controls: SIEM
        00:44
      • 5.22 Log Management
        01:42
      • 5.23 Orchestration
        01:10
      • 5.24 Availability of Guest OS
        01:59
      • 5.25 Operations Management: Part One
        02:16
      • 5.26 Real-World Scenario
        01:22
      • 5.27 Operations Management: Part Two
        01:46
      • 5.28 Risk Management Process: Framing Risk and Risk Assessment
        01:55
      • 5.29 Quantitative Risk Analysis
        01:29
      • 5.30 Scenario
        01:18
      • 5.31 Risk Response and Risk Monitoring
        01:18
      • 5.32 Collection and Preservation of Digital Evidence
        04:08
      • 5.33 Communication with Relevant Parties
        01:32
      • 5.34 Real-World Scenario
        01:34
      • 5.35 Security Operations Center
        02:15
      • 5.36 Key Takeaways
        01:04
      • Knowledge Check
    • Lesson 7 - Legal Risk and Compliance

      47:45
      • 6.01 Legal, Risk, and Compliance
        01:28
      • 6.02 Case Study
        02:28
      • 6.03 Legislative Concepts
        04:39
      • 6.04 Intellectual Property Laws
        04:56
      • 6.05 Case Study
        01:27
      • 6.06 Business Scenario
        01:04
      • 6.07 Acts and Agreements
        03:22
      • 6.08 Case Study
        01:21
      • 6.09 NERC
        01:36
      • 6.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP)
        01:13
      • 6.11 Jurisdictional Differences in Data Privacy
        01:27
      • 6.12 Terminologies and eDiscovery
        01:09
      • 6.13 Forensic Requirements and PII
        02:02
      • 6.14 Gap Analysis, SOC Reports, and Chain of Custody
        02:59
      • 6.15 Vendor Management
        01:35
      • 6.16 Cloud Computing Policies and Risk Attitude
        02:37
      • 6.17 SLA
        03:32
      • 6.18 Quality of Service
        01:44
      • 6.19 Risk Mitigation
        03:21
      • 6.20 Risk Management Metrics and ISO Standard
        01:44
      • 6.21 Real-World Scenario
        01:12
      • 6.22 Key Takeaways
        00:49
      • Knowledge Check
    • {{childObj.title}}

      • {{childObj.childSection.chapter_name}}

        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & Certification

  • What changes have been made to the CCSP exam?

    The content of the CCSP exam has been refreshed to reflect the most common issues cloud security professionals face, along with the best practices for mitigating those issues. Some topics have been updated while others have been realigned. The result is an exam that more accurately reflects the knowledge and hands-on experience with cloud security architecture, design, operations, and service orchestration.

    Previous CCSP Domain Name    
    Domain 1: Architectural Concepts & Design Requirements    
    Domain 2: Cloud Data Security    
    Domain 3: Cloud Platform and Infrastructure Security    
    Domain 4: Cloud Application Security
    Domain 5: Operations    
    Domain 6: Legal & Compliance    

    New CCSP Domain Name
    Domain 1: Cloud Concepts, Architecture, and Design
    Domain 2: Cloud Data Security
    Domain 3: Cloud Platform and Infrastructure Security
    Domain 4: Cloud Application Security
    Domain 5: Cloud Security Operations
    Domain 6: Legal Risk and Compliance


    The cumulative scoring weight of each area is also changing.

    Domain 1: Cloud Concepts, Architecture, and Design – 17%
    Domain 2: Cloud Data Security – 19%
    Domain 3: Cloud Platform and Infrastructure Security – 17%
    Domain 4: Cloud Application Security – 17%
    Domain 5: Cloud Security Operations – 7%
    Domain 6: Legal, Risk, and Compliance – 13%

  • When are these changes effective?

    The changes are effective beginning August 1, 2019.

  • How much does the CCSP certification exam cost?

    The CCSP certification exam costs $549.

  • How many questions are there in the CCSP certification exam? What is the passing score?

    The CCSP exam consists of 125 multiple-choice questions. To pass the exam, you will need to have a minimum passing score of at least 700/1000 (or 70 percent) in order to gain your certification.

  • In what language will the CCSP exam be available?

    Refreshed CCSP exams are available only in English.

  • What do I need to do to unlock my Simplilearn certificate?

    To unlock your certificate from Simplilearn, you must complete 85 percent of the self-paced learning and successfully pass the course end assessment with a score of 70 percent or above. 

Reviews

Srinivas R
Srinivas R IT Security Manager at HCL Technologies

The quality of the training is very good. The method and technologies used in Simplilearn made the learning engaging and interesting. The customer support is very good. I had a very good experience in Simplilearn.

Read more Read less

    FAQs

    • What is CCSP?

      CCSP is an acronym that stands for; Certified Cloud Security Professional. This certification validates your advanced skills and knowledge in the ability to design, manage, and safeguard data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the Cyber Security experts at (ISC)².

    • What are the benefits of becoming a CCSP?

      Benefits of being CCSP-Certified are:

      • Increases career visibility and credibility
      • The certification creates job security and new job opportunities
      • Allows you to gain versatile vendor-neutral skills that can be applied to different technologies and methodologies
      • Gain access to a global community of like-minded cybersecurity leaders
      • Be better prepared to stem cyber attacks and inspire a safe and secure cyber world
      • On average, (ISC)² members report earning 35% more than non-members
         

    • What are the prerequisites for this course?

      To obtain the CCSP certification course, you must have at least five years of working experience in IT including three years of information security and one year of cloud security experience. Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification.

    • Who are the instructors and how are they selected?

      All of our highly qualified instructors are industry experts with years of relevant industry experience working with front-end development technology. Each one has gone through a rigorous selection process that includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating remain on our faculty. All trainers are also practitioners in the field which they teach assuring that you are learning from someone with real-world, industry experience.
       

    • What tools do I need to attend the training sessions?

      The tools you’ll need to attend the CCSP Course are:

      • Windows: Windows XP SP3 or higher
      • Mac: OSX 10.6 or higher
      • Internet speed: Preferably 512 Kbps or higher
      • Headset, speakers, and microphone: You’ll need headphones or speakers to hear instructions clearly, as well as a microphone to talk to other professionals learning alongside you. You can use a headset with a built-in microphone, or separate speakers and microphone based upon your preference.
         

    • How do I enroll in this online training?

      You can enroll in this training on our website and make an online payment using any of the following options:
      · Visa Credit or Debit Card
      · MasterCard
      · American Express
      · Diner’s Club
      · PayPal
      Once payment is received, you will automatically receive a payment receipt and access information via email.
       

    • Can I cancel my enrollment? Will I get a refund?

      Yes, you can cancel your enrollment if necessary. We will refund the course price after deducting an administration fee. To learn more, you can view our refund policy
       

    • Disclaimer
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.