CCSP Certification Training


01 - 01 Jan, 1970



Why Attend?

CCSP Certification Training

course-obj_img Course Objectives

  • black-circle_img

    By the end of the course, participants will be able to:

    • Describe the physical and virtual components of and identify the principle technologies of cloud based systems
    • Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments
    • Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
    • Differentiate between various "as-a-Service" delivery models and frameworks that are incorporated into the cloud computing reference architecture
    • Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations
    • Contrast between forensic analysis in corporate data center and cloud computing environments
    • Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing
    • Identify and explain the six phases of the data lifecycle
    • Explain strategies for protecting data at rest and data in motion
    • Describe the role of encryption in protecting data and specific strategies for key management
    • Compare a variety of cloud-based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements
    • Contrast security aspects of Software Development Lifecycle (SDLC) in standard data center and cloud computing environments
    • Describe how federated identity and access management solutions mitigate risks in cloud computing systems
    • Conduct gap analysis between baseline and industry-standard best practices
    • Evaluate Service Level Agreements (SLAs) for cloud computing environments
    • Conduct risk assessments of existing and proposed cloud-based environments
    • State the professional and ethical standards of (ISC)² and the Certified Cloud Security Professional

course-obj_img Target Audience

The training seminar is ideal for those working in positions such as but not limited to:

  • Enterprise Architect
  • Security Administrator
  • Systems Engineer
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Manager
  • Systems Architect

Architectural Concept and Design

  • · Cloud Computing Concepts
  • · Cloud Reference Architecture
  • · Cloud Computing Security Concepts
  • · Design Principles of Secure Cloud Computing
  • · Trusted Cloud Services

Cloud Data Security

  • · CSA, Cloud Data Lifecycle
  • · Cloud Data Storage Architectures
  • · Data Security Strategies
  • · Data Discovery and Classification Technologies
  • · Protecting Privacy and PII
  • · Data Rights Management
  • · Data Retention, Deletion, and Archiving Policies
  • · Auditability, Traceability, and Accountability of Data Events

Cloud Platform and Infrastructure Security

  • · Cloud Infrastructure Components
  • · Cloud Infrastructure Risks
  • · Designing and Planning Security Controls
  • · Disaster Recovery and Business Continuity Management

Cloud Application and Security

  • · The Need for Security Awareness
  • · Training in application Security
  • · Cloud Software Assurance and Validation
  • · Verified Secure Software
  • · SDLC (Software Development Life Cycle) Process
  • · Secure SDLC
  • · Specifics of Cloud Application Architecture
  • · Secure IAM (Identity and Access Management) Solutions


  • · Planning Process for the Data Center Design
  • · Installation and Configuration of Physical Infrastructure for Cloud Environment
  • · Running Physical Infrastructure for Cloud Environment
  • · Managing Physical Infrastructure for Cloud Environment
  • · Installation and Configuration of Logical Infrastructure for Cloud Environment
  • · Running Logical Infrastructure for Cloud Environment
  • · Managing Logical Infrastructure for Cloud Environment
  • · Compliance with Regulations and Controls
  • · Risk Assessment for Logical and Physical Infrastructure
  • · Collection, Acquisition, and Preservation of Digital Evidence
  • · Managing Communication with Stakeholders

Legal and Compliance

  • · Legal Requirements and Unique Risks within the Cloud Environment
  • · Relevant Privacy and PII Laws and Regulations
  • · Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
  • · Implications of Cloud to Enterprise Risk Management
  • · Outsourcing and Cloud Contract Design
  • · Vendor Management

1970 - Course Type & Date

DATE: 01 - 01 Jan, 1970

Join Our Community