• 0

CCSP (Certified Cloud Security Professional) Certification [Self-Paced Learning]

> The CCSP validates the learner's technical skills to design, manage and secure data and applications in the cloud
> CCSP is a widely recognized certification
> As per Glassdoor, the average Salary of a Principal Information Security professional is around $137,364 per year


$ 1299 $ 1799


Customized to your team's needs
  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Course Overview

This CCSP course help learners gain expertise in cloud security architecture, design, applications, and operations This course introduces the concepts of CCSP and help learners to advance their career in Cloud Security

Key Highlights

  • 14 hours of self-paced videos
  • Lifetime access to self-paced learning
  • Industry-recognized course completion certificate
  • Seven real-world case studies
  • Lifetime access to high-quality self-paced e-learning content curated by industry experts
  • 24x7 learner assistance and support
  • Exam Included

What You'll Learn

  • Learning cloud computing concepts
  • Understanding cloud architecture and design
  • Understanding the concepts of cloud infrastructure security
  • Vulnerabilities and risk
  • Learning the concept of threat modeling
  • Learning Identity and access management
  • Learning cloud security operations and disaster recovery
  • Learning risk management and analysis

Career Benefits

  • Cloud computing is a growing market
  • Widely recognized Certification
  • Better career opportunities
  • Higher salary

Who Can Attend

  • Architects
  • Security administrators
  • Systems engineers
  • Security architects
  • Security consultants
  • Security engineers
  • Security managers
  • Any individual looking to learn about IT security and Cloud Computing

Exam Formats

Exam not included. 

Course Delivery

This course is available in the following formats:

  • Self-Paced Learning Duration: 14 Hrs

Related Courses

Course Syllabus

Lesson 01 - Cloud Concepts, Architecture, and Design

Domain and Learning Objectives
Security Concepts
Key Security Concepts, Defense in Depth, Due Care, and Due Diligence
Security Controls and Functionalities
Cloud Computing Concepts
Business Drivers
Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
Cloud Computing Concepts: Advantages
Cloud Reference Architecture
Cloud Computing Roles and Actors
Cloud Service Categories: Infrastructure as a Service (IaaS)
Cloud Service Categories: Platform as a Service (PaaS)
Cloud Service Categories: Software as a Service (SaaS)
Cloud Service Categories: Management
Cloud Deployment Models: Public Cloud
Cloud Deployment Models: Private Cloud
Cloud Deployment Models: Hybrid Cloud
Cloud Deployment Models: Community Cloud
Models and Characteristics
Comparison of Cloud Deployment Models
Case Study: Hybrid Cloud
Cloud Technology Roadmap
Impact of Related Technologies
Cryptography, Key Management, and Other Security Concepts
Key Management
IAM and Access Control
Data Remanence
Cloud Computing Threats
Design Principles of Secure Cloud Computing
Cost-Benefit Analysis
Evaluate Cloud Service Providers
IT Security Evaluation
Key Takeaways

Lesson 02 - Cloud Data Security

Domain and Learning Objectives
Cloud Data Life Cycle
Cloud Data Life Cycle: Create, Store, Use, and Share
Real-World Scenario
Cloud Data Life Cycle: Archive
Cloud Data Life Cycle: Destroy, Key Data Functions
Cloud Data Storage Architectures
Cloud Data Storage Architectures: Storage Types for IaaS
Cloud Data Storage Architectures: Storage Types for PaaS
Cloud Data Storage Architectures: Storage Types for SaaS
Cloud Data Storage Architectures: Threats to Storage Types
Real-World Scenario
Data Security Strategies
Data Security Strategies: Encryption (Use Cases)
Data Security Strategies: Encryption Challenges
Data Security Strategies: Encryption in IaaS
Data Security Strategies: Database Encryption
Data Security Strategies: Key Management
Data Security Strategies: Key Storage in the Cloud
Data Security Strategies: Masking
Data Security Strategies: Data Anonymization
Data Security Strategies: Tokenization
Data Security Strategies: Homomorphic Encryption and Bit Splitting
Real-World Scenario
Data Security Strategies: Data Loss Prevention
Data Discovery and Classification Technology
Data Discovery and Classification Technology: Data Classification
Data Discovery and Classification Technology: Challenges with Cloud Data
Jurisdictional Data Protections for Personally Identifiable Information (PII)
Privacy Acts: GDPR
Privacy Acts: Data Protection policies
Privacy Acts: United States
Privacy Acts: HIPAA, FISMA, and SOX
Jurisdictional Data Protections for PII: Responsibilities of Cloud Services
Data Rights Management
Data Retention, Deletion, and Archiving Policies
Data Retention
Data Deletion
Real-World Scenario
Data Archiving
Real-World Scenario
Legal Hold
Auditability, Traceability, and Accountability of Data Events
Chain of Custody
Real-World Scenario
Key Takeaways

Lesson 03 - Cloud Platform and Infrastructure Security

Domain and Learning objectives
Cloud Infrastructure Components
Network and Communications
Management Plane and Virtualization
Factors That Impact Datacenter Design
Physical Design: Buy or Build
Physical Design: Data Center Design Standards
Physical Design: Uptime Institute
Physical Design: Tiers
Physical Design: Features of Tiers
Real-World Scenario
Environmental Design Considerations
Hypervisor and Resource Allocation
Risks Associated with Cloud Infrastructure
Policy, General, and Virtualization Risks
Cloud-Specific, Legal, and Non-Cloud Specific Risks
Cloud Attack Vectors and Compensating Controls
Business Scenario
Design and Plan Security Controls
Real-World Scenario
Plan Disaster Recovery and Business Continuity
DReal-World Scenario
RBCDR Planning Factors and Disruptive Events
Characteristics of Cloud Infrastructure
BCDR Strategies and Returning to Normal
Real-World Scenario
BCDR Creation
BCDR Creation: Test
Business Requirements
BCDR Creation: Report and Revise
Testing Types, Uptime, Availability, Activity, and Case Study
Security Training and Awareness
Real-World Scenario
Key Takeaways

Lesson 04 - Cloud Application Security

Domain and Learning objectives
Advocate Training and Awareness for Application Security
Real-World Scenario
Common Pitfalls
Encryption Dependency Awareness
Business Scenario
Understanding Software Development Lifecycle Process
Real-World Scenario
Vulnerabilities and Risks
Threat Modeling
Real-World Scenario
Sandboxing and Application Virtualization
Federated Identity Management
SAML Authentication
Identity and Access Management
Multi-Factor Authentication
Real-World Scenario
Cloud Access Security Broker
Application Security Testing
Software Supply Chain Management
Real-World Scenario
Key Takeaways

Lesson 05 - Cloud Security Operations

Domain and Learning objectives
Secure Configuration of Hardware: Servers
Secure Configuration of Hardware: Storage Controllers (Part 1)
Real-World Scenario
Secure Configuration of Hardware: Storage Controllers (Part 2)
Secure Configuration of Hardware: Virtual Switches
Configuration of VM Tools
Configuration of VM Tools: Running a Physical Infrastructure (Part 1)
Configuration of VM Tools: Running a Physical Infrastructure (Part 2)
Configuration of VM Tools: Running a Physical Infrastructure (Part 3)
Configuration of VM Tools: Running a Physical Infrastructure (Part 4)
Real-World Scenario
Securing Network Configuration (Part 1)
Real-World Scenario
Clustered Hosts
Dynamic Optimization and Clustered Storage
Maintenance Mode and Patch Management
Performance Monitoring
Real-World Scenario
Network Security Controls: Layered Security and Honeypots
Network Security Controls: SIEM
Log Management
Availability of Guest OS
Operations Management (Part 1)
Real-World Scenario
Operations Management (Part 2)
Risk-Management Process: Framing Risk and Risk Assessment
Quantitative Risk Analysis
Risk Response and Risk Monitoring
Collection and Preservation of Digital Evidence
Communication with Relevant Parties
Real-World Scenario
Security Operations Center
Key Takeaways

Lesson 06 - Legal Risk and Compliance

Domain and Learning objectives
Case Study
Legislative Concepts
Intellectual Property Laws
Case Study
Acts and Agreements
Case Study
Privacy Shield and Generally Accepted Privacy Principles (GAPP)
Jurisdictional Difference in Data Privacy
Terminologies and eDiscovery
Forensic Requirements and PII
Gap Analysis, SOC Reports, and Chain of Custody
Vendor Management
Cloud Computing Policies and Risk Attitude
Quality of Service
Risk Mitigation
Risk Management Metrics and ISO 28000:2007
Real-World Scenario
Key Takeaways