Certified Cloud Security Knowledge (CCSK Plus) Training

Course Overview

Certificate of Cloud Security Knowledge (CCSK) is a registered trademark and course of the Cloud Security Alliance (CSA).

The Cloud Security Alliance (CSA) has developed a catalog of security best practices, the “Security Guidance for Critical Areas of Focus in Cloud Computing, V4.0“which was last updated significantly in year 2017 and In addition, the European Network and Information Security Agency (ENISA) created a whitepaper called “Cloud Computing: Benefits, Risks and Recommendations for Information Security.

Together these documents are a broad foundation of knowledge about cloud security. Their topics range from architecture, governance, compliance, operations, encryption, virtualization and much more.

The course is designed purposely to give participants an idea to decide how valuable the CCSK is, and understand to attain the certification.

This course is based on guidelines to cover the exam topics and provide participants a curve in there preparation of CCSK Exam.

This preparation course focuses on the efforts requires to manage security issues and implement best practices over a broad range of cloud computing domains.

By attending this course, professionals will get the skills to identify security threats and best practices for securing the cloud and also learn to assess, build, and secure a cloud infrastructure through a series of hands-on/practical exercises.

About Exam

CCSK training and certification maintained by the Cloud Security Alliance (CSA) which facilitates a common understanding of cloud security concepts. This increases the quality of risk decisions that are made in your organization

The CCSK certification is an individual certification that can be earned after passing the online exam and passing the same is an evidence that individual is knowledgeable about cloud security.

Who Should Attend

The training program is ideal for those working in positions such as, but not limited to - –

  • Cloud Solution Architects, Cloud Security Managers, IT Security solution Architect, Cloud Risk Managers, Cloud Security Consultants, IT Security Auditors, Enterprise Information Security Architect or anyone want to generate his/her expertise in cloud security.

Course Duration

  • 24 Hours (3 Days * 8 Hours)

Course Content / Outline

Cloud Architecture

  • Define cloud computing and why you care about it
  • Discuss the different components of the cloud computing stack
  • Work through the cloud reference model and understand where security fits in

Infrastructure Security for Cloud

  • Understand the components of cloud infrastructure
  • Assess the security implications of virtual networks and workloads
  • Learn the security advantages and disadvantages of working with cloud infrastructure
  • Evaluate how to secure the cloud management plane
  • Learn how to manage business continuity for cloud computing

Managing Cloud Security and Risk

  • Tools of governance
  • Adjusting risk management for cloud computing
  • Legal: jurisdictions, contracts, and eDiscovery
  • Compliance and compliance inheritance
  • Audit management for cloud computing
  • Information governance
  • Introduction to the CCM & CAIQ

Data Security for Cloud Computing

  • Understand different cloud storage models
  • Define security issues for data in the cloud
  • Assess the role and effectiveness of access controls
  • Learn different cloud encryption models
  • Understand additional data security options
  • Introduce data security lifecycle

Application Security and Identity Management for Cloud Computing

  • Discover how application security differs in cloud computing
  • Review secure software development basics and how those change in the cloud
  • Leverage cloud capabilities for more secure cloud applications

Cloud Security Operations

  • Learn how to select cloud providers
  • Understand the advantages & disadvantages of Security as a Service
  • Assess the different major Security as a Service categories
  • Learn how to respond to security incidents in the cloud
  • Understand the security issues of technologies related to cloud computing