Read more here
CCSP Certification Training
DATE
Yet to be Determind
LOCATION
Accra
Why Attend?
CCSP Certification Training
Course Objectives
- This Course Objective Hasn't Been Provided Yet
Target Audience
The training seminar is ideal for those working in positions such as but not limited to:
- Enterprise Architect
- Security Administrator
- Systems Engineer
- Security Architect
- Security Consultant
- Security Engineer
- Security Manager
- Systems Architect
Architectural Concept and Design
- · Cloud Computing Concepts
- · Cloud Reference Architecture
- · Cloud Computing Security Concepts
- · Design Principles of Secure Cloud Computing
- · Trusted Cloud Services
Cloud Data Security
- · CSA, Cloud Data Lifecycle
- · Cloud Data Storage Architectures
- · Data Security Strategies
- · Data Discovery and Classification Technologies
- · Protecting Privacy and PII
- · Data Rights Management
- · Data Retention, Deletion, and Archiving Policies
- · Auditability, Traceability, and Accountability of Data Events
Cloud Platform and Infrastructure Security
- · Cloud Infrastructure Components
- · Cloud Infrastructure Risks
- · Designing and Planning Security Controls
- · Disaster Recovery and Business Continuity Management
Cloud Application and Security
- · The Need for Security Awareness
- · Training in application Security
- · Cloud Software Assurance and Validation
- · Verified Secure Software
- · SDLC (Software Development Life Cycle) Process
- · Secure SDLC
- · Specifics of Cloud Application Architecture
- · Secure IAM (Identity and Access Management) Solutions
Operations
- · Planning Process for the Data Center Design
- · Installation and Configuration of Physical Infrastructure for Cloud Environment
- · Running Physical Infrastructure for Cloud Environment
- · Managing Physical Infrastructure for Cloud Environment
- · Installation and Configuration of Logical Infrastructure for Cloud Environment
- · Running Logical Infrastructure for Cloud Environment
- · Managing Logical Infrastructure for Cloud Environment
- · Compliance with Regulations and Controls
- · Risk Assessment for Logical and Physical Infrastructure
- · Collection, Acquisition, and Preservation of Digital Evidence
- · Managing Communication with Stakeholders
Legal and Compliance
- · Legal Requirements and Unique Risks within the Cloud Environment
- · Relevant Privacy and PII Laws and Regulations
- · Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
- · Implications of Cloud to Enterprise Risk Management
- · Outsourcing and Cloud Contract Design
- · Vendor Management
Join Our Community