Course Overview

Gain expertise in cloud security architecture, design, applications, and operations with this CCSP online training certification course. You will receive step-by-step guidance and an easy-to-follow, detailed lesson plan regarding every facet of CCSP, helping you accelerate your career in the growing field of cloud security.

Key Features

100% Money Back Guarantee
100% money-back guarantee*

Our training course comes with a 100% money-back guarantee. Simplilearn believes in our highly effective blended learning methodology and its ability to provide learners with the knowledge and confidence to pass the CCSP Exam in the first attempt.

Valid only in INDIA, AFRICA & INDIAN Subcontinent.

No questions asked refund*

At Simplilearn, we value the trust of our patrons immensely. But, if you feel that a course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!
  • 50 hours of blended learning
  • Lifetime access to self-paced learning
  • Industry-recognized course completion certificate
  • 7 real-world case studies

Skills Covered

  • Cloud computing concepts
  • Cloud architecture and design
  • Cloud infrastructure security
  • Cloud data lifecycle
  • Cloud application security
  • Vulnerabilities and risk
  • Threat modeling
  • Encryption
  • Identity and access management
  • Cloud security operations
  • Risk management and analysis
  • Disaster recovery
  • Business continuity

Training Options

Self-Paced Learning

₹ 15,999

  • Lifetime access to high-quality self-paced e-learning content curated by industry experts
  • 24x7 learner assistance and support

Blended Learning

₹ 24,999

  • 90 days of flexible access to online classes
  • Lifetime access to high-quality self-paced e-learning content and live class recordings
  • 24x7 learner assistance and support
  • Classes starting in Delhi from:-
25th Apr: Weekend Class

Corporate Training

Customized to your team's needs

  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Course Curriculum

Eligibility

This online CCSP certification course is ideal for anyone wishing to learn and explore career opportunities in IT network security and cloud computing. This course also is ideal for enterprise architects, security administrators, systems engineers, security architects, security consultants, security engineers, security managers, and system architects.

Read More

Pre-requisites

To obtain the CCSP certification course, you must have: 

  • At least five years of working experience in IT, including three years of information security and one year of cloud security experience 

                                                                      ALSO

  • Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification
Read More

Course Content

  • Certified Cloud Security Professional (CCSP®)

    Preview
    • Lesson 1 - Course Introduction

      11:16Preview
      • 1.1 CCSP Certification Overview
        08:28
      • 1.2 Course Objectives
        02:48
    • Lesson 2 - Cloud Concepts, Architecture, and Design

      01:13:29Preview
      • 1.01 Cloud Concepts, Architecture, and Design
        01:08
      • 1.02 Security Concepts
        02:41
      • 1.03 Key Security Concepts, Defense in Depth, Due Care, and Due Dilligence
        02:48
      • 1.04 Security Controls and Functionalities
        02:43
      • 1.05 Cloud Computing Concepts
        00:45
      • 1.06 Business Drivers
        01:13
      • 1.07 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
        01:27
      • 1.08 Cloud Computing Concepts Advantages
        01:05
      • 1.09 Cloud Reference Architecture
        00:55
      • 1.10 Cloud Computing Roles and Actors
        01:25
      • 1.11 Cloud Service Categories Infrastructure as a Service (IaaS)
        04:15
      • 1.12 Cloud Service Categories Platform as a Service (PaaS)
        04:21
      • 1.13 Cloud Service Categories Software as a Service (SaaS)
        03:31
      • 1.14 Cloud Service Categories Management
        01:03
      • 1.15 Cloud Deployment Models: Public Cloud
        00:47
      • 1.16 Cloud Deployment Models: Private Cloud
        00:53
      • 1.17 Cloud Deployment Models: Hybrid Cloud
        00:53
      • 1.18 Cloud Deployment Models: Community Cloud
        00:55
      • 1.19 Models and Characteristics
        01:13
      • 1.20 Comparison of Cloud Deployment Models
        00:35
      • 1.21 Case Study: Hybrid Cloud
        01:32
      • 1.22 Cloud Technology Roadmap
        04:07
      • 1.23 Impact of Related Technologies
        06:46
      • 1.24 Cryptography
        02:36
      • 1.25 Key Management
        01:06
      • 1.26 IAM and Access Control
        02:12
      • 1.27 Data Remanence
        01:00
      • 1.28 Virtualization
        03:02
      • 1.29 Common Threats
        03:42
      • 1.30 Design Principles of Secure Cloud Computing
        02:05
      • 1.31 Cost-Benefit Analysis
        00:33
      • 1.32 Evaluate Cloud Service Providers
        02:46
      • 1.33 SOC
        00:38
      • 1.34 IT Security Evaluation
        01:28
      • 1.35 FIPS
        02:14
      • 1.36 Scenario
        02:17
      • 1.37 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 3 - Cloud Data Security

      01:21:15Preview
      • 2.01 Cloud Data Security
        01:07
      • 2.02 Cloud Data Life Cycle
        01:06
      • 2.03 Cloud Data Life Cycle: Create, Store, Use, and Share
        03:29
      • 2.04 Real-World Scenario
        01:28
      • 2.05 Cloud Data Life Cycle: Archive
        02:10
      • 2.06 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
        02:38
      • 2.07 Cloud Data Storage Architectures
        00:57
      • 2.08 Cloud Data Storage Architectures: Storage Types for IaaS
        00:56
      • 2.09 Cloud Data Storage Architectures: Storage Types for PaaS
        01:03
      • 2.10 Cloud Data Storage Architectures: Storage Types for SaaS
        01:26
      • 2.11 Cloud Data Storage Architectures: Threats to Storage Types
        02:23
      • 2.12 Real-World Scenario
        00:55
      • 2.13 Data Security Strategies
        00:44
      • 2.14 Data Security Strategies: Encryption (Use Cases)
        01:13
      • 2.15 Data Security Strategies: Encryption Challenges
        02:06
      • 2.16 Data Security Strategies: Encryption in IaaS
        02:33
      • 2.17 Data Security Strategies: Database Encryption
        01:21
      • 2.18 Data Security Strategies: Key Management
        02:02
      • 2.19 Data Security Strategies: Key Storage in the Cloud
        01:25
      • 2.20 Data Security Strategies: Masking
        01:25
      • 2.21 Data Security Strategies: Data Anonymization
        00:48
      • 2.22 Data Security Strategies: Tokenization
        01:32
      • 2.23 Data Security Strategies: Homomorphic Encryption and Bit Splitting
        02:41
      • 2.24 Real-World Scenario
        01:18
      • 2.25 Data Security Strategies: Data Loss Prevention
        03:22
      • 2.26 Scenario
        01:38
      • 2.27 Data Discovery and Classification Technology
        04:14
      • 2.28 Data Discovery and Classification Technology: Data Classification
        01:41
      • 2.29 Data Discovery and Classification Technology: Challenges With Cloud Data
        01:20
      • 2.30 Jurisdictional Data Protections for Personally Identifiable Information (PII)
        01:34
      • 2.31 Privacy Acts: GDPR
        04:07
      • 2.32 Privacy Acts: GDPR Data Protection Principles
        03:09
      • 2.33 Privacy Acts: United States
        01:00
      • 2.34 Privacy Acts: HIPAA, FISMA, and SOX
        02:21
      • 2.35 Jurisdictional Data Protections for PII: Responsibilites of Cloud Services
        01:31
      • 2.36 Data Rights Management
        03:33
      • 2.37 Data Retention, Deletion, and Archiving Policies
        00:27
      • 2.38 Data Retention
        00:29
      • 2.39 Data Deletion
        01:21
      • 2.40 Real-World Scenario
        01:27
      • 2.41 Data Archiving
        00:38
      • 2.42 Real-World Scenario
        01:00
      • 2.43 Legal Hold
        01:00
      • 2.44 Auditability, Traceability, and Accountability of Data Events
        01:07
      • 2.45 SIEM
        02:36
      • 2.46 Chain of Custody
        00:39
      • 2.47 Nonrepudation
        00:25
      • 2.48 Real-World Scenario
        01:01
      • 2.49 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 4 - Cloud Platform and Infrastructure Security

      56:14Preview
      • 3.01 Cloud Platform and Infrastructure Security
        01:04
      • 3.02 Cloud Infrastructure Components
        01:22
      • 3.03 Network and Communications
        02:10
      • 3.04 Management Plane and Virtualization
        01:07
      • 3.05 Factors That Impact Data Center Design
        01:53
      • 3.06 Physical Design: Buy or Build
        00:47
      • 3.07 Physical Design: Data Center Design Standards
        02:02
      • 3.08 Physical Design: Uptime Institute
        01:00
      • 3.09 Physical Design: Tiers
        03:34
      • 3.10 Physical Design Features of Tiers
        01:03
      • 3.11 Real-World Scenario
        01:03
      • 3.12 Environmental Design Considerations
        02:59
      • 3.13 Connectivity
        00:28
      • 3.14 Hypervisor and Resource Allocation
        01:27
      • 3.15 Risks Associated with Cloud Infrastructure
        00:23
      • 3.16 Policy General and Virtualization Risks
        02:40
      • 3.17 Cloud-Specific Legal and Non-Cloud Specific Risks
        03:04
      • 3.18 Cloud Attack Vectors and Compensating Controls
        01:10
      • 3.19 Business Scenario
        01:29
      • 3.20 Design and Plan Security Controls
        02:13
      • 3.21 Real-World Scenario
        01:09
      • 3.22 Plan Disaster Recovery and Business Continuity
        01:07
      • 3.23 Real-World Scenario
        01:04
      • 3.24 BCDR Planning Factors and Disruptive Events
        00:58
      • 3.25 Characteristics of Cloud Infrastructure
        00:23
      • 3.26 BCDR strategies and Returning to Normal
        01:06
      • 3.27 Real-World Scenario
        01:13
      • 3.28 BCDR Creation
        02:34
      • 3.29 BCDR Creation: Test
        05:11
      • 3.30 Business Requirements
        01:09
      • 3.31 BCDR Creation: Report and Revise
        00:42
      • 3.32 Testing Types, Uptime, Availability, Activity, and Case Study
        03:55
      • 3.33 Security Training and Awareness
        00:48
      • 3.34 Real-World Scenario
        01:23
      • 3.35 Key Takeaways
        00:34
      • Knowledge Check
    • Lesson 5 - Cloud Application Security

      38:19Preview
      • 4.01 Cloud Application Security
        01:25
      • 4.02 Advocate Training and Awareness for Application Security
        02:14
      • 4.03 Real-World Scenario
        00:59
      • 4.04 Common Pitfalls
        02:36
      • 4.05 Encryption Dependency Awareness
        00:40
      • 4.06 Business Scenario
        01:15
      • 4.07 Understanding Software Development Lifecycle Process
        00:34
      • 4.08 Real-World Scenario
        00:57
      • 4.09 Vulnerabilities and Risks
        01:21
      • 4.10 Threat Modeling
        03:36
      • 4.11 Real-World Scenario
        01:34
      • 4.12 Encryption
        02:02
      • 4.13 Sandboxing and Application Virtualization
        01:19
      • 4.14 Federated Identity Management
        02:28
      • 4.15 SAML Authentication
        02:49
      • 4.16 Identity and Access Management
        01:42
      • 4.17 Multi-Factor Authentication
        02:16
      • 4.18 Real-World Scenario
        01:36
      • 4.19 Cloud Access Security Broker
        02:18
      • 4.20 Application Security Testing
        01:32
      • 4.21 Software Supply Chain Management
        01:11
      • 4.22 Real-World Scenario
        01:06
      • 4.23 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 6 - Cloud Security Operations

      01:04:59Preview
      • 5.01 Cloud Security Operations
        01:31
      • 5.02 Secure Configuration of Hardware: Servers
        03:45
      • 5.03 Secure Configuration of Hardware: Storage Controllers
        00:37
      • 5.04 Real-World Scenario
        01:27
      • 5.05 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription
        02:26
      • 5.06 Secure Configuration of Hardware: Virtual Switches
        01:38
      • 5.07 Configuration of VM Tools
        00:49
      • 5.08 Configuration of VM Tools Running a Physical Infrastructure: Legal, Compatibility, Control, and Log Data
        01:35
      • 5.09 Configuration of VM Tools Running a Physical Infrastructure: PCI DSS Access, Upgrades and Changes, and Failover Technology
        01:25
      • 5.10 Configuration of VM Tools Running a Physical Infrastructure: Compliance, Regulations, and Outsourcing
        01:41
      • 5.11 Configuration of VM Tools Running a Physical Infrastructure: Placement of Security, Virtualization, VM
        01:37
      • 5.12 Real-World Scenario
        01:26
      • 5.13 Securing Network Configuration
        04:06
      • 5.14 Real-World Scenario
        01:11
      • 5.15 Clustered Hosts
        01:42
      • 5.16 Dynamic Optimization and Clustered Storage
        01:48
      • 5.17 Maintenance Mode and Patch Management
        03:25
      • 5.18 Performance Monitoring
        01:21
      • 5.19 Real-World Scenario
        01:10
      • 5.20 Network Security Controls: Layered Security and Honeypots
        02:47
      • 5.21 Network Security Controls: SIEM
        00:44
      • 5.22 Log Management
        01:42
      • 5.23 Orchestration
        01:10
      • 5.24 Availability of Guest OS
        01:59
      • 5.25 Operations Management: Part One
        02:16
      • 5.26 Real-World Scenario
        01:22
      • 5.27 Operations Management: Part Two
        01:46
      • 5.28 Risk Management Process: Framing Risk and Risk Assessment
        01:55
      • 5.29 Quantitative Risk Analysis
        01:29
      • 5.30 Scenario
        01:18
      • 5.31 Risk Response and Risk Monitoring
        01:18
      • 5.32 Collection and Preservation of Digital Evidence
        04:08
      • 5.33 Communication with Relevant Parties
        01:32
      • 5.34 Real-World Scenario
        01:34
      • 5.35 Security Operations Center
        02:15
      • 5.36 Key Takeaways
        01:04
      • Knowledge Check
    • Lesson 7 - Legal Risk and Compliance

      47:45Preview
      • 6.01 Legal, Risk, and Compliance
        01:28
      • 6.02 Case Study
        02:28
      • 6.03 Legislative Concepts
        04:39
      • 6.04 Intellectual Property Laws
        04:56
      • 6.05 Case Study
        01:27
      • 6.06 Business Scenario
        01:04
      • 6.07 Acts and Agreements
        03:22
      • 6.08 Case Study
        01:21
      • 6.09 NERC
        01:36
      • 6.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP)
        01:13
      • 6.11 Jurisdictional Differences in Data Privacy
        01:27
      • 6.12 Terminologies and eDiscovery
        01:09
      • 6.13 Forensic Requirements and PII
        02:02
      • 6.14 Gap Analysis, SOC Reports, and Chain of Custody
        02:59
      • 6.15 Vendor Management
        01:35
      • 6.16 Cloud Computing Policies and Risk Attitude
        02:37
      • 6.17 SLA
        03:32
      • 6.18 Quality of Service
        01:44
      • 6.19 Risk Mitigation
        03:21
      • 6.20 Risk Management Metrics and ISO Standard
        01:44
      • 6.21 Real-World Scenario
        01:12
      • 6.22 Key Takeaways
        00:49
      • Knowledge Check

Exam & Certification

CCSP Training in Delhi
  • What changes have been made to the CCSP exam?

    The content of the CCSP exam has been refreshed to reflect the most common issues cloud security professionals face, along with the best practices for mitigating those issues. Some topics have been updated while others have been realigned. The result is an exam that more accurately reflects the knowledge and hands-on experience with cloud security architecture, design, operations, and service orchestration.

    Previous CCSP Domain Name    
    Domain 1: Architectural Concepts & Design Requirements    
    Domain 2: Cloud Data Security    
    Domain 3: Cloud Platform and Infrastructure Security    
    Domain 4: Cloud Application Security
    Domain 5: Operations    
    Domain 6: Legal & Compliance    

    New CCSP Domain Name
    Domain 1: Cloud Concepts, Architecture, and Design
    Domain 2: Cloud Data Security
    Domain 3: Cloud Platform and Infrastructure Security
    Domain 4: Cloud Application Security
    Domain 5: Cloud Security Operations
    Domain 6: Legal Risk and Compliance


    The cumulative scoring weight of each area is also changing.

    Domain 1: Cloud Concepts, Architecture, and Design – 17%
    Domain 2: Cloud Data Security – 19%
    Domain 3: Cloud Platform and Infrastructure Security – 17%
    Domain 4: Cloud Application Security – 17%
    Domain 5: Cloud Security Operations – 7%
    Domain 6: Legal, Risk, and Compliance – 13%

  • When are these changes effective?

    The changes are effective beginning August 1, 2019.

  • How much does the CCSP certification exam cost?

    The CCSP certification exam costs $549.

  • How many questions are there in the CCSP certification exam? What is the passing score?

    The CCSP exam consists of 125 multiple-choice questions. To pass the exam, you will need to have a minimum passing score of at least 700/1000 (or 70 percent) in order to gain your certification.

  • In what language will the CCSP exam be available?

    Refreshed CCSP exams are available only in English.

  • What do I need to do to unlock my Simplilearn certificate?

    To unlock your certificate from Simplilearn, you must complete 85 percent of the self-paced learning and successfully pass the course end assessment with a score of 70 percent or above. 

Reviews

  • Srinivas R

    Srinivas R

    IT Security Manager at HCL Technologies, Chennai

    The quality of the training is very good. The method and technologies used in Simplilearn made the learning engaging and interesting. The customer support is very good. I had a very good experience in Simplilearn.

prevNext

Why Simplilearn

Simplilearn’s Blended Learning model brings classroom learningexperience online with its world-class LMS. It combines instructor-led training, self-paced learning and personalized mentoring to provide an immersive learning experience

  • Self-Paced Online Video

    A 360-degree learning approach that you can adapt to your learning style

  • Live Virtual Classroom

    Engage and learn more with these live and highly-interactive classes alongside your peers

  • 24/7 Teaching Assistance

    Keep engaged with integrated teaching assistance in your desktop and mobile learning

  • Online Practice Labs

    Projects provide you with sample work to show prospective employers

  • Applied Projects

    Real-world projects relevant to what you’re learning throughout the program

  • Learner Social Forums

    A support team focused on helping you succeed alongside a peer community

FAQs

  • You offer a money back guarantee. How does it work?

    Terms and Conditions: 
    Our training comes with a 100% money-back guarantee. Simplilearn believes in our highly effective blended learning methodology and its ability to provide learners with the knowledge and confidence to pass the CCSP exam  in the first attempt. If you do not pass the CCSP exam on the first attempt, Simplilearn will refund the course price to you.

    To ensure your success, we strongly recommend that you take the CCSP exam within a week of the course completion date—or a maximum of 45 days from the completion of the online training. This way, the course materials will be fresh in your mind.

    CCSP Exam Attempts:

    Attempt Time Frame Result Money back
    First Within 6 months (180 days) from enrollment date Did Not Pass Refund full course price


    Refund Process: If you do not pass the exam on the first attempt, Simplilearn will refund the full course price to you. To receive a refund, you must make a request through the Help and Support Forum. You must submit a copy of your scorecard along with the date you completed your online classroom training. Simplilearn will refund the course price within 30 days of receiving all required documentation. We will process the refund using the same method you used to pay for the course.
     
    Terms and Conditions: 
    This money-back guarantee applies only to Simplilearn’s CCSP blended learning. It is not applicable for Simplilearn’s Self-Paced Learning CCSP course. The guarantee is valid only for participants who have paid the entire enrollment fee.

    The guarantee becomes void if:

    • Participants do not take the CCSP examination within 45 days of unlocking the certificate.
    • Participants do not maintain 100% attendance during the training sessions.
    • Participants fail to score at least 80% in at least 2 simulation tests available at lms.Simplilearn.com
    • Participants fail to book their exam within 6 months from the date of enrollment 
    • Participants do not follow the instructions of the trainer and do not complete the exercises given during the training.
    • Participants do not submit the required documents to Simplilearn.
    • Participants failed to request a refund within 15 days of receiving their results 
       

  • What is CCSP?

    CCSP is an acronym that stands for; Certified Cloud Security Professional. This certification validates your advanced skills and knowledge in the ability to design, manage, and safeguard data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the Cyber Security experts at (ISC)².

  • What are the benefits of becoming a CCSP?

    Benefits of being CCSP-Certified are:

    • Increases career visibility and credibility
    • The certification creates job security and new job opportunities
    • Allows you to gain versatile vendor-neutral skills that can be applied to different technologies and methodologies
    • Gain access to a global community of like-minded cybersecurity leaders
    • Be better prepared to stem cyber attacks and inspire a safe and secure cyber world
    • On average, (ISC)² members report earning 35% more than non-members
       

  • What are the prerequisites for this course?

    To obtain the CCSP certification course, you must have at least five years of working experience in IT including three years of information security and one year of cloud security experience. Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification.

  • Who are the instructors and how are they selected?

    All of our highly qualified instructors are industry experts with years of relevant industry experience working with front-end development technology. Each one has gone through a rigorous selection process that includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating remain on our faculty. All trainers are also practitioners in the field which they teach assuring that you are learning from someone with real-world, industry experience.
     

  • What tools do I need to attend the training sessions?

    The tools you’ll need to attend the CCSP Course are:

    • Windows: Windows XP SP3 or higher
    • Mac: OSX 10.6 or higher
    • Internet speed: Preferably 512 Kbps or higher
    • Headset, speakers, and microphone: You’ll need headphones or speakers to hear instructions clearly, as well as a microphone to talk to other professionals learning alongside you. You can use a headset with a built-in microphone, or separate speakers and microphone based upon your preference.
       

  • How do I enroll in this online training?

    You can enroll in this training on our website and make an online payment using any of the following options:
    · Visa Credit or Debit Card
    · MasterCard
    · American Express
    · Diner’s Club
    · PayPal
    Once payment is received, you will automatically receive a payment receipt and access information via email.
     

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment if necessary. We will refund the course price after deducting an administration fee. To learn more, you can view our refund policy
     

Our Delhi Correspondence / Mailing address

Simplilearn Solutions Pvt Ltd, 2nd Floor, KLJ Tower North, B-5 District Centre, Netaji Subhash Place, Wazirpur, New Delhi – 110034, India, Call us at: 1800-212-7688

Find CCSP Certification in other cities

BangaloreMumbai
  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.