Loading...

Course Description

Looking to land that cyber role, elevate your career in cloud security, and stand out among your peers?

The Certified Cloud Security Professional (CCSP®) Prep course offers a thorough review of the essential knowledge needed to understand cloud computing and its associated information security risks and mitigation strategies. This course supports the review and reinforcement of existing knowledge while identifying areas that may require additional focus for the CCSP exam. The content is aligned with the six domains of the ISC2 CCSP Common Body of Knowledge (CBK®), ensuring applicability across all aspects of cloud security. Developed by ISC2, the official courseware ensures that the training remains relevant and current. Instruction is led by verified security experts who hold the CCSP and have undergone rigorous training to deliver ISC2 content effectively.

Course features:

  • Instruction from an ISC2 Authorized Instructor
  • Official ISC2 Student Training Guide
  • Chapter quizzes
  • Interactive flashcards to reinforce learning
  • Real-world learning activities and scenarios
  • Case studies and discussions
  • Post-course assessment questions to gauge exam readiness

Course Details

Learning Outcomes

By the completion of this course, successful students will be able to:

  • Understand legal frameworks and guidelines that affect cloud services.
  • Recognize the fundamentals of data privacy regulatory/legislative mandates.
  • Assess risks, vulnerabilities, threats and attacks in the cloud environment.
  • Evaluate the design and plan for cloud infrastructure security controls.
  • Evaluate what is necessary to manage security operations.
  • Understand what operational controls and standards to implement.
  • Describe the types of cloud deployment models in the types of “as a service” cloud models
  • currently available today.
  • Identify key terminology and associated definitions related to cloud technology. Be able to
  • establish a common terminology for use within a team or workgroup.
  • Build a business case for cloud adoption and be able to determine with business units the benefits of the cloud and cloud migration strategies.

Topics:

Chapter 1: Cloud Concepts, Architecture and Design

  • State the essential characteristics of cloud computing
  • Describe the fundamental cloud computing services
  • Describe the cloud computing reference architectures
  • Explain cloud computing activities
  • Compare cloud service capabilities and models
  • Describe cloud deployment models
  • Summarize the economic characteristics of cloud computing
  • Evaluate cloud computing ROI and KPI metrics
  • Summarize cloud computing security concepts
  • Describe key security considerations for each service model
  • Analyze key cloud service provider contractual relationship documents

Chapter 2: Cloud Governance: Legal, Risk and Compliance

  • Explain the issues with international conflict of law
  • Interpret guidelines for digital forensics
  • Identify the fundamentals of data privacy regulatory/legislative mandates
  • Summarize audit process, methodologies and cloud-ready adaptations
  • Describe risk management related to cloud services
  • Identify due care/diligence activities related to service contracts

Chapter 3: Cloud Data Security

  • Discuss cloud data security concepts
  • Describe cryptography
  • Explain data discovery and classification technologies
  • Interpret cloud data storage architectures
  • Analyze information rights management
  • Assess cloud data security strategies
  • Compare solutions for cloud data retention, deletion and archival policies
  • Explain basic security concepts in the cloud

Chapter 4: Cloud Platform and Infrastructure Security

  • Compare cloud infrastructure components
  • Select standard practices for implementing a secure data center design
  • Assess risks, vulnerability, threats and attacks in the cloud environment
  • Discover components for planning and implementing security controls
  • Evaluate the design and plan for cloud infrastructure security controls
  • Appraise appropriate identity and access management (IAM) solutions
  • Recommend business continuity and disaster recovery (BCDR) standards

Chapter 5: Cloud Application Security

  • Explain training and awareness solutions for application security
  • Assess challenges in the secure software development life cycle (SDLC) process
  • Select a threat model for securing software development
  • Demonstrate cloud software assurance and validation
  • Choose verified secure software
  • Explain the specifics of a cloud application architecture

Chapter 6: Cloud Security Operations

  • Analyze what is used to manage and operate physical and logical infrastructure of a cloud
  • environment
  • Discuss operational controls and standards
  • Identify methodologies for supporting digital forensics
  • Identify critical communication needs with relevant parties
  • Define auditability, traceability and accountability of security-relevant data events
  • Select requirements to implement secure operations

Individuals in the following roles may benefit from this certification:

  • Security Managers
  • Systems Architects
  • Security Architects
  • Security Consultants
  • Enterprise Architects
  • Security Administrators

Notes

Each learner enrolled in this course will be eligible for one attempt to take the CCSP exam within one month of the course section's end date.

Prerequisites

No mandatory prerequisites.

Self-assessment for enrolment:

Recent graduates (degree, associate degree or diploma) in IT/Computer Science specializing in Cybersecurity and Cloud Computing

Or

At least 5 years of working experience in IT infrastructure/Cloud Computing, and Cybersecurity

Or

Recommended pre-requisites:

Proficiencies

The Associate of ISC2 designation can be earned by anyone who passes an exam for an ISC2 certification requiring work experience. 

To qualify for ISC2 CCSP cybersecurity certification, you must pass the exam and have at least five years of cumulative work experience in information technology, of which three years must be in information security, and one year in one or more of the six domains of the ISC2 CCSP Common Body of Knowledge (CBK). Learn more about CCSP Experience Requirements

Applies Towards the Following Program(s)

Loading...
Enrol Now - Select a section to enrol in
Type
Online Synchronous
Days
Sa
Time
9:00AM to 5:00PM
Dates
Mar 01, 2025 to Mar 29, 2025
Schedule and Location
Hours
35.0
Delivery Options
Course Fees
Flat fee non-credit $3,499.00
Instructor(s)
  • Ashief Ahmed
Section Notes

Classes are held online in real time (Mountain Time) at the specified time and dates.

This course uses:

  • Desire2Learn (D2L), an online learning management system. The instructor will post the course outline and other materials in D2L.
  • Zoom web conferencing software.

For more information, please visit our Online Learning Resources.

Unless notified, all online courses are available at 9 am MT the day before the start date. Students registering on (or after) the start date will receive access within one day of registration.

Students unfamiliar with online learning are encouraged to take our free Digital Skills for Learning Online course.

Unless otherwise stated, notice of withdrawal or transfer from a course must be received at least seven calendar days prior to the start date of the course.

 

Required fields are indicated by .