Certified Cloud Security

Certified Cloud Security Professionals (CCSP)

Course Objective

To access greater efficiency, scalability, and speed, businesses are migrating their applications to the cloud. However, security has also become a top priority as the number of applications grows, which has increased demand for qualified cloud security professionals. This course is your next step toward passing the Certified Cloud Security Professional (CCSP) exam if you want to pursue a career in cloud computing security and can prove that you understand cloud concepts and fundamentals well.

Who can do this Course
  • IT and Cloud Security Experts
  • Enterprise Architects
  • Security Consultants
  • Systems Engineers
  • Security Administrators
CCSP Course Syllabus
1Module 1: Understand Cloud Computing Concepts
  • Introduction to Cloud Computing
  • Benefits of Cloud Computing
  • Cloud Computing Definitions
  • Cloud Computing Roles
  • Key Cloud Computing Characteristics
  • Building Block Technologies
2Module 2: Describe Cloud Reference Architecture
  • Cloud Reference Model
  • Conceptual Reference Model
  • Cloud Computing Activities
  • Cloud Service Capabilities
  • Deployment Models
  • Cloud Shared Considerations
  • Impact of Related Technologies
3Module 3: Understand Security Concepts Relevant to Cloud Computing
  • Cryptography
  • Key Management
  • IAM and Access Control
  • Data and Media Sanitization
  • Virtualization Security
  • Common Threats
  • Network Security
4Module 4: Understand Design Principles of Secure Cloud Computing
  • Cloud Secure Data Lifecycle
  • Cloud-Based Disaster Recovery (DR) Planning
  • Business Continuity Planning
  • Cost-Benefit Analysis
  • Security Considerations for Different Cloud Categories
5Module 5: Identify Trusted Cloud Services
  • Certification Against Criteria
6Module 6: Describe Cloud Data Concepts
  • Cloud Data Life Cycle Phases
  • Data Dispersion
7Module 7: Design and Implement Cloud Data Storage Architectures
  • Storage Types
  • Threats to Storage Types
8Module 8: Design and Apply Data Security Technologies and Strategies
  • Encryption
  • Key Management
  • Hashing
  • Data De-identification
  • Data Masking
  • Tokenization
  • Data Loss Prevention (DLP)
9Module 9: Implement Data Discovery
  • Structured Data
  • Unstructured Data
10Module 10: Implement Data Classification
  • Mapping
  • Labelling
  • Sensitive Data
11Module 11: Design and Implement Information Rights Management (IRM)
  • Provisioning
  • Access Models
  • Appropriate Tools
12Module 12: Plan and Implement Data Retention, Deletion and Archiving Policies
  • Data Protection Policies
  • Data Retention Policies
  • Data Archiving Policies
  • Legal Hold
13Module 13: Design and Implement Auditability, Traceability and Accountability of Data Events
  • Definition of Event Sources
  • Requirement of Identity Attribution
  • Logging
  • Storage and Analysis of Data Events
  • Chain of Custody and Nonrepudiation
14Module 14: Comprehend Cloud Infrastructure Components
  • Cloud Infrastructure
  • Physical Environment
  • Network and Communications
  • Compute Parameters of a Cloud Server
  • Virtualization
  • Storage
  • Management Plane
15 Module 15: Design a Secure Data Centre
  • Logical Design
  • Physical Design
  • Environmental Design
16Module 16: Analise Risks Associated with Cloud Infrastructure
17Module 17: Design and Plan Security Controls
18Module 18: Plan Disaster Recovery and Business Continuity Management
19Module 19: Advocate Training and Awareness for Application Security
20Module 20: Describe the Secure Software Development Life Cycle (SDLC) Process
21Module 21: Apply the Secure Software Development Life Cycle (SDLC)
22Module 22: Apply Cloud Software Assurance and Validation
  • Functional Testing
  • Security Testing Methodologies
23Module 23: Use Verified Secure Software
24Module 24: Comprehend the Specifics of Cloud Application Architecture
25Module 25: Design Appropriate Identity and Access Management (IAM) Solutions
26Module 26: Implement and Build Physical and Logical Infrastructure for Cloud Environment
27Module 27: Operate Physical and Logical Infrastructure for Cloud Environment
28Module 28: Manage Physical and Logical Infrastructure for Cloud Environment
29Module 29: Implement Operational Controls and Standards
30Module 30: Support Digital Forensics
31Module 31: Manage Communication with Relevant Parties
  • Vendors
  • Customers
  • Partners
  • Regulators
  • Other Stakeholders
32Module 32: Manage Security Operations
  • Security Operations Center (SOC)
  • Log Capture and Analysis
33Module 33: Articulate Legal Requirements and Unique Risks within the Cloud Environment
34Module 34: Understand Privacy Issues
35Module 35: Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
36Module 36: Understand Implications of Cloud to Enterprise Risk Management
37Module 37: Understand Outsourcing and Cloud Contract Design

Benefits of learning Certified Cloud Security at Solve Tech Training Institute

  • Our experienced professionals are instructing this course.
  • Solve Tech provides you the facility to schedule the classes according to your availability.
  • Following each session, you'll receive the course material for your own future reference.
  • You will receive an internationally recognised certification after completing the course.

SOLVE TECH STUDENT BENEFITS


Focused Training
Placement Assistance
Lab Support
Expert Trainers

Flexible Timing
Interview Prepration
Hands on Training
Affordable Course Fee