Course Overview

Training Options

Corporate Training

Customized to your team's needs

  • Blended learning delivery model (self-paced e-learning and/or instructor-led options)
  • Course, category, and all-access pricing
  • Enterprise-class learning management system (LMS)
  • Enhanced reporting for individuals and teams
  • 24x7 teaching assistance and support

Course Curriculum

Course Content

  • Certified Cloud Security Professional

    Preview
    • Lesson 1 - Course Introduction

      11:16Preview
      • 1.1 CCSP Certification Overview
        08:28
      • 1.2 Course Objectives
        02:48
    • Lesson 2 - Cloud Concepts, Architecture, and Design

      01:13:29Preview
      • 1.01 Cloud Concepts, Architecture, and Design
        01:08
      • 1.02 Security Concepts
        02:41
      • 1.03 Key Security Concepts, Defense in Depth, Due Care and Due Dilligence
        02:48
      • 1.04 Security Controls and Functionalities
        02:43
      • 1.05 Cloud Computing
        00:45
      • 1.06 Business Drivers
        01:13
      • 1.07 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
        01:27
      • 1.08 Cloud Computing Concepts Advantages
        01:05
      • 1.09 The Conceptual Reference Model
        00:55
      • 1.10 Cloud Computing Roles and Actors
        01:25
      • 1.11 Cloud Service Categories Infrastructure as a Service (IaaS)
        04:15
      • 1.12 Cloud Service Categories Platform as a Service (PaaS)
        04:21
      • 1.13 Cloud Service Categories Software as a Service (SaaS)
        03:31
      • 1.14 Cloud Service Categories Management
        01:03
      • 1.15 Cloud Deployment Models Public Cloud
        00:47
      • 1.16 Cloud Deployment Models Private Cloud
        00:53
      • 1.17 Cloud Deployment Models Hybrid Cloud
        00:53
      • 1.18 Cloud Deployment Models Community Cloud
        00:55
      • 1.19 Models and Characteristics
        01:13
      • 1.20 Comparison of Cloud Deployment Models
        00:35
      • 1.21 Case Study hybrid Cloud
        01:32
      • 1.22 Cloud Technology Roadmap
        04:07
      • 1.23 Impact of Related Technologies
        06:46
      • 1.24 Cryptography
        02:36
      • 1.25 Key Management
        01:06
      • 1.26 IAM and IAM Phases
        02:12
      • 1.27 Data Remanence
        01:00
      • 1.28 Virtualization
        03:02
      • 1.29 Common Threats
        03:42
      • 1.30 Design Principles of Secure Cloud Computing
        02:05
      • 1.31 Cost-Benefit Analysis
        00:33
      • 1.32 Evaluate Cloud Service Providers
        02:46
      • 1.33 SOC
        00:38
      • 1.34 IT Security EvaluationIT Security Evaluation
        01:28
      • 1.35 FIPS
        02:14
      • 1.36 Scenario
        02:17
      • 1.37 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 3 - Cloud Data Security

      01:21:15Preview
      • 2.01 Cloud Data Security
        01:07
      • 2.02 Cloud Data Life Cycle
        01:06
      • 2.03 Cloud Data Life Cycle: Create, Store, Use, and Share
        03:29
      • 2.04 Real-World Scenario
        01:28
      • 2.05 Cloud Data Life Cycle Archive
        02:10
      • 2.06 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
        02:38
      • 2.07 Cloud Data Storage Architectures
        00:57
      • 2.08 Cloud Data Storage Architectures: Storage Types for IaaS
        00:56
      • 2.09 Cloud Data Storage Architectures: Storage Types for PaaS
        01:03
      • 2.10 Cloud Data Storage Architectures: Storage Types for SaaS
        01:26
      • 2.11 Cloud Data Storage Architectures: Threats to Storage Types
        02:23
      • 2.12 Real-World Scenario
        00:55
      • 2.13 Data Security Strategies
        00:44
      • 2.14 Data Security Strategies Encryption (Use Cases)
        01:13
      • 2.15 Data Security Strategies Encryption Challenges
        02:06
      • 2.16 Data Security Strategies Encryption in IaaS
        02:33
      • 2.17 Data Security Strategies Database Encryption
        01:21
      • 2.18 Data Security Strategies Key Management
        02:02
      • 2.19 Data Security Strategies Key Storage in the Cloud
        01:25
      • 2.20 Data Security Strategies Masking
        01:25
      • 2.21 Data Security Strategies Data Anonymization
        00:48
      • 2.22 Data Security Strategies Tokenization
        01:32
      • 2.23 Data Security Strategies Homomorphic Encryption and Bit Splitting
        02:41
      • 2.24 Real-World Scenario
        01:18
      • 2.25 Data Security Strategies Data Loss Prevention
        03:22
      • 2.26 Scenario
        01:38
      • 2.27 Data Discovery and Classification Technology
        04:14
      • 2.28 Data Discovery and Classification Technology Data Classification
        01:41
      • 2.29 Data Discovery and Classification Technology Challenges with Cloud Data
        01:20
      • 2.30 Jurisdictional Data Protections for Personally Identifiable Information (PII)
        01:34
      • 2.31 Privacy Acts GDPR
        04:07
      • 2.32 Privacy Acts GDPR Data Protection
        03:09
      • 2.33 Privacy Acts United States
        01:00
      • 2.34 Privacy Acts HIPAA, FISMA, and SOX
        02:21
      • 2.35 Jurisdictional Data Protections for PII Responsibilites of Cloud Services
        01:31
      • 2.36 Data Rights Management
        03:33
      • 2.37 Data Retention, Deletion, and Archiving Policies
        00:27
      • 2.38 Data Retention
        00:29
      • 2.39 Data Deletion
        01:21
      • 2.40 Real World Scenario
        01:27
      • 2.41 Data Archiving
        00:38
      • 2.42 Real World Scenario
        01:00
      • 2.43 Legal Hold
        01:00
      • 2.44 Auditability, Traceability, and Accountability of Data Events
        01:07
      • 2.45 SIEM
        02:36
      • 2.46 Chain of Custody
        00:39
      • 2.47 Nonrepudation
        00:25
      • 2.48 Real World Scenario
        01:01
      • 2.49 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 4 - Cloud Platform and Infrastructure Security

      56:14Preview
      • 3.01 Cloud Platform and Infrastructure Security
        01:04
      • 3.02 Cloud Infrastructure Components
        01:22
      • 3.03 Network and Communications
        02:10
      • 3.04 Management Plane and Virtualization
        01:07
      • 3.05 Factors That Impact Datacenter Design
        01:53
      • 3.06 Physical Design - Buy or Build
        00:47
      • 3.07 Physical Design - Datacenter Design Standards
        02:02
      • 3.08 Physical Design - Uptime Institute
        01:00
      • 3.09 Physical Design - Tiers
        03:34
      • 3.10 Physical Design Features of Tiers
        01:03
      • 3.11 Real-World Scenario
        01:03
      • 3.12 Environmental Design Considerations
        02:59
      • 3.13 Connectivity
        00:28
      • 3.14 Hypervisor and Resource Allocation
        01:27
      • 3.15 Risks Associated with Cloud Infrastructure
        00:23
      • 3.16 Policy General and Virtualization Risks
        02:40
      • 3.17 Cloud-Specific Legal and Non-Cloud Specific Risks
        03:04
      • 3.18 Cloud Attack Vectors and Compensating Controls
        01:10
      • 3.19 Business Scenario
        01:29
      • 3.20 Design and Plan Security Controls
        02:13
      • 3.21 Real-World Scenario
        01:09
      • 3.22 Plan Disaster Recovery and Business Continuity
        01:07
      • 3.23 Real-World Scenario
        01:04
      • 3.24 BCDR Planning Factors and Disruptive Events
        00:58
      • 3.25 Characteristics of Cloud Infrastructure
        00:23
      • 3.26 BCDR strategies and Returning to Normal
        01:06
      • 3.27 Real-World Scenario
        01:13
      • 3.28 BCDR Creation
        02:34
      • 3.29 BCDR Creation Test
        05:11
      • 3.30 Business Requirements
        01:09
      • 3.31 BCDR Creation Report and Revise
        00:42
      • 3.32 Testing Types Uptime Availability Activity and Case Study
        03:55
      • 3.33 Security Training and Awareness
        00:48
      • 3.34 Real-World Scenario
        01:23
      • 3.35 Key Takeaways
        00:34
      • Knowledge Check
    • Lesson 5 - Cloud Application Security

      38:19Preview
      • 4.01 Cloud Application Security
        01:25
      • 4.02 Advocate Training and Awareness for Application Security
        02:14
      • 4.03 Real-World Scenario
        00:59
      • 4.04 Common Pitfalls
        02:36
      • 4.05 Encryption Dependencies
        00:40
      • 4.06 Business Scenario
        01:15
      • 4.07 Understanding Software Development Lifecycle Process
        00:34
      • 4.08 Real World Scenario
        00:57
      • 4.09 Vulnerabilities and Risks
        01:21
      • 4.10 Threat Modeling
        03:36
      • 4.11 Real World Scenario
        01:34
      • 4.12 Encryption
        02:02
      • 4.13 Sandboxing and Application Virtualization
        01:19
      • 4.14 Federated Identity Management
        02:28
      • 4.15 SAML Authentication
        02:49
      • 4.16 Identity and Access Management
        01:42
      • 4.17 Multi Factor Authentication
        02:16
      • 4.18 Real world Scenario
        01:36
      • 4.19 Cloud Access Security Broker
        02:18
      • 4.20 Application Security Testing
        01:32
      • 4.21 Software Supply Chain Management
        01:11
      • 4.22 Real World Scenario
        01:06
      • 4.23 Key Takeaways
        00:49
      • Knowledge Check
    • Lesson 6 - Cloud Security Operations

      01:04:45Preview
      • 5.01 Cloud Security Operations
        01:31
      • 5.02 Secure Configuration of Hardware: Servers
        03:45
      • 5.03 Secure Configuration of Hardware: Storage Controllers
        00:37
      • 5.04 Real-World Scenario
        01:27
      • 5.05 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription
        02:26
      • 5.06 Secure Configuration of Hardware: Virtual Switches
        01:38
      • 5.07 Configuration of VM Tools
        00:49
      • 5.08 Configuration of VM Tools Running a Physical Infrastructure Part 1
        01:35
      • 5.09 Configuration of VM Tools Running a Physical Infrastructure Part 1
        01:25
      • 5.10 Configuration of VM Tools Running a Physical Infrastructure Part 3
        01:41
      • 5.11 Configuration of VM Tools Running a Physical Infrastructure Part 4
        01:37
      • 5.12 Real-World Scenario
        01:12
      • 5.13 Securing Network Configuration Part 1
        04:06
      • 5.14 Real-World Scenario
        01:11
      • 5.15 Clustered Host
        01:42
      • 5.16 Dynamic Optimization and Clustered Storage
        01:48
      • 5.17 Maintenance Mode and Patch Management
        03:25
      • 5.18 Performance Monitoring
        01:21
      • 5.19 Real-World Scenario
        01:10
      • 5.20 Network Security Controls Layered Security and Honeypots
        02:47
      • 5.21 Network Security Controls SIEM
        00:44
      • 5.22 Log Management
        01:42
      • 5.23 Orchestration
        01:10
      • 5.24 Availability of Guest OS
        01:59
      • 5.25 Operations Management Part 1
        02:16
      • 5.26 Real World Scenario
        01:22
      • 5.27 Operations Management Part 2
        01:46
      • 5.28 Risk Management Process Framing Risk and Risk Assessment
        01:55
      • 5.29 Quantitative Risk Analysis
        01:29
      • 5.30 Scenario
        01:18
      • 5.31 Risk Response and Risk Monitoring
        01:18
      • 5.32 Collection and Preservation of Digital Evidence
        04:08
      • 5.33 Communication with Relevant Parties
        01:32
      • 5.34 Real World Scenario
        01:34
      • 5.35 Security Operations Center
        02:15
      • 5.36 Key Takeaways
        01:04
      • Knowledge Check
    • Lesson 7 - Legal Risk and Compliance

      47:45Preview
      • 6.01 Legal Risk and Compliance
        01:28
      • 6.02 Case Study
        02:28
      • 6.03 Legislative Concepts
        04:39
      • 6.04 Intellectual Property Laws
        04:56
      • 6.05 Case Study
        01:27
      • 6.06 Business Scenario
        01:04
      • 6.07 Acts and Agreements
        03:22
      • 6.08 Case Study
        01:21
      • 6.09 NERC
        01:36
      • 6.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP)
        01:13
      • 6.11 Jurisdictional Differences in Data Privacy
        01:27
      • 6.12 Terminologies and eDiscovery
        01:09
      • 6.13 Forensic Requirements and PII
        02:02
      • 6.14 Gap Analysis SOC Reports and Chain of Custody
        02:59
      • 6.15 Vendor Management
        01:35
      • 6.16 Cloud Computing Policies and Risk Attitude
        02:37
      • 6.17 SLA
        03:32
      • 6.18 Quality of Service
        01:44
      • 6.19 Risk Mitigation
        03:21
      • 6.20 Risk Management Metrics and ISO 28000 2007
        01:44
      • 6.21 Real-World Scenario
        01:12
      • 6.22 Key Takeaways
        00:49
      • Knowledge Check
  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.