Certified Cloud Security Professional Training

433 Learners

Course Overview

Address real-world cloud security challenges through practical case studies and hands-on exercises. Build expertise in cloud security architecture, design, applications, and operations with comprehensive Certified Cloud Security Professional training. Stay ahead of evolving cyber threats with expert-led guidance.

Skills Covered

  • Cloud Concepts Architecture and Design
  • Cloud Platform and Infrastructure Security
  • Cloud Security Operations
  • Cloud Data Lifecycle
  • Identity and Access Management
  • Vulnerabilities Risk management and analysis
  • Business Continuity
  • Cloud Data Security
  • Cloud Application Security
  • Legal Risk and Compliance
  • Encryption
  • Threat Modeling
  • Disaster Recovery
  • Cloud Concepts Architecture and Design
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Cloud Security Operations
  • Legal Risk and Compliance
  • Cloud Data Lifecycle
  • Encryption
  • Identity and Access Management
  • Threat Modeling
  • Vulnerabilities Risk management and analysis
  • Disaster Recovery
  • Business Continuity
  • Cloud Concepts Architecture and Design
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Cloud Security Operations
  • Legal Risk and Compliance
  • Cloud Data Lifecycle
  • Encryption
  • Identity and Access Management
  • Threat Modeling
  • Vulnerabilities Risk management and analysis
  • Disaster Recovery
  • Business Continuity

Course Curriculum

Eligibility

This online  certification course is ideal for anyone wishing to learn and explore career opportunities in IT network security and cloud computing. This course also is ideal for enterprise architects, security administrators, systems engineers, security architects, security consultants, security engineers, security managers, and system architects.
Minimum five years cumulative, full-time experience in information technology
Three years specifically in information security
One year in one or more of the six domains of the current CCSP Exam Outline.
A post-secondary degree in computer science, IT, or related fields may substitute for up to one year of required experience
An additional credential from the ISC2 approved list may substitute for one year of experience in CCSP domains.
An active CISSP credential can substitute for the entire CCSP experience requirement.
Part-time work and internships may count towards the experience requirement.
Candidates lacking CCSP experience can attain Associate of ISC2 status by passing the CCSP examination.
Associates of ISC2 are granted six years to accumulate the required five years of experience.
Work Experience:
- Full-Time Experience: Work experience accumulates on a monthly basis, requiring a minimum of 35 hours per week for four weeks to qualify for one month of experience.
- Part-Time Experience: Part-time experience must be a minimum of 20 hours per week and a maximum of 34 hours per week.
1040 hours of part-time = 6 months of full-time experience
2080 hours of part-time = 12 months of full-time experience
- Internship: Paid or unpaid internships are both acceptable. Documentation confirming your intern position is required and should be on company/organization letterhead. If interning at a school, the document can be on the registrar’s stationery.
Read More

Pre-requisites


Basic understanding of security concepts
Knowledge of cloud computing
Networking and cryptography skills
Experience with security tools and technologies
Read More

Course Content

  • Certified Cloud Security Professional Training

    Preview
    • Lesson 01: Course Introduction

      02:00Preview
      • 1.01 Welcome to Certified Cloud Security Professional Course
        00:26
      • 1.02 Certification Overview
        01:34
    • Lesson 02: Understand Cloud Computing Concepts

      11:44Preview
      • 2.01 Cloud Computing Definitions
        02:25
      • 2.02 Cloud Computing Roles
        02:30
      • 2.03 Key Cloud Computing Characteristics
        02:35
      • 2.04 Building Block Technologies
        04:14
    • Lesson 03: Describe Cloud Reference Architecture

      19:10Preview
      • 3.01 Cloud Computing Activities
        01:57
      • 3.02 Cloud Service Capabilities
        02:13
      • 3.03 Define Cloud Models
        02:21
      • 3.04 Platform as a Service (PaaS)
        02:25
      • 3.05 Software as a Service (SaaS)
        01:30
      • 3.06 Cloud Deployment Models - Public, Private, Hybrid
        01:19
      • 3.07 Cloud Shared Considerations
        04:01
      • 3.08 Impact of Related Technologies
        03:24
    • Lesson 04: Understand Security Concepts Relevant to Cloud Computing

      15:18Preview
      • 4.01 Cryptography and Key Management
        02:40
      • 4.02 Access Control
        02:15
      • 4.03 Data and Media Sanitization
        02:20
      • 4.04 Network Security
        02:42
      • 4.05 Virtualization Security
        02:11
      • 4.06 Common Threats
        03:10
    • Lesson 05: Understand Design Principles of Secure Cloud Computing

      09:15Preview
      • 5.01 Cloud Secure Data Lifecycle
        01:15
      • 5.02 Cloud based Disaster Recovery (DR) and Business Continuity (BC) planning
        02:03
      • 5.03 Cost Benefit Analysis
        00:58
      • 5.04 Functional Security Requirements
        02:17
      • 5.05 Security Considerations for Different Cloud Categories
        02:42
    • Lesson 06: Evaluate Cloud Service Providers

      06:11Preview
      • 6.01 Verification Against Criteria
        03:27
      • 6.02 System and Subsystem Product Certifications
        02:44
    • Lesson 07: Cloud Data Security

      04:27
      • 7.01 Cloud Data Life Cycle Phases
        02:07
      • 7.02 Data Dispersion
        02:20
    • Lesson 08: Design and Implement Cloud Data Storage Architectures

      04:15
      • 8.01 Storage Types
        02:48
      • 8.02 Threats to Storage Types
        01:27
    • Lesson 09: Design and Apply Data Security Technologies and Strategies

      11:23
      • 9.01 Encryption and Key Management
        04:00
      • 9.02 Hashing
        02:14
      • 9.03 Masking
        00:57
      • 9.04 Tokenization
        00:31
      • 9.05 Data Loss Prevention (DLP)
        01:44
      • 9.06 Data Obfuscation
        00:45
      • 9.07 Data De-identification
        01:12
    • Lesson 10: Implement Data Discovery

      01:33Preview
      • 10.01 Structured Data
        00:42
      • 10.02 Unstructured Data
        00:51
    • Lesson 11: Implement Data Classification

      02:48
      • 11.01 Mapping
        00:42
      • 11.02 Labeling
        00:46
      • 11.03 Sensitive data
        01:20
    • Lesson 12: Design and Implement Information Rights Management (IRM)

      04:08Preview
      • 12.01 Objectives
        02:51
      • 12.02 Appropriate Tools
        01:17

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.