Read more here
CCSP Certification Training
DATE
01 - 01 Jan, 1970
LOCATION
Accra
Why Attend?
CCSP Certification Training
Course Objectives
-
By the end of the course, participants will be able to:
- Describe the physical and virtual components of and identify the principle technologies of cloud based systems
- Define the roles and responsibilities of customers, providers, partners, brokers and the various technical professionals that support cloud computing environments
- Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
- Differentiate between various "as-a-Service" delivery models and frameworks that are incorporated into the cloud computing reference architecture
- Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations
- Contrast between forensic analysis in corporate data center and cloud computing environments
- Evaluate and implement the security controls necessary to ensure confidentiality, integrity and availability in cloud computing
- Identify and explain the six phases of the data lifecycle
- Explain strategies for protecting data at rest and data in motion
- Describe the role of encryption in protecting data and specific strategies for key management
- Compare a variety of cloud-based business continuity / disaster recovery strategies and select an appropriate solution to specific business requirements
- Contrast security aspects of Software Development Lifecycle (SDLC) in standard data center and cloud computing environments
- Describe how federated identity and access management solutions mitigate risks in cloud computing systems
- Conduct gap analysis between baseline and industry-standard best practices
- Evaluate Service Level Agreements (SLAs) for cloud computing environments
- Conduct risk assessments of existing and proposed cloud-based environments
- State the professional and ethical standards of (ISC)² and the Certified Cloud Security Professional
Target Audience
The training seminar is ideal for those working in positions such as but not limited to:
- Enterprise Architect
- Security Administrator
- Systems Engineer
- Security Architect
- Security Consultant
- Security Engineer
- Security Manager
- Systems Architect
Architectural Concept and Design
- · Cloud Computing Concepts
- · Cloud Reference Architecture
- · Cloud Computing Security Concepts
- · Design Principles of Secure Cloud Computing
- · Trusted Cloud Services
Cloud Data Security
- · CSA, Cloud Data Lifecycle
- · Cloud Data Storage Architectures
- · Data Security Strategies
- · Data Discovery and Classification Technologies
- · Protecting Privacy and PII
- · Data Rights Management
- · Data Retention, Deletion, and Archiving Policies
- · Auditability, Traceability, and Accountability of Data Events
Cloud Platform and Infrastructure Security
- · Cloud Infrastructure Components
- · Cloud Infrastructure Risks
- · Designing and Planning Security Controls
- · Disaster Recovery and Business Continuity Management
Cloud Application and Security
- · The Need for Security Awareness
- · Training in application Security
- · Cloud Software Assurance and Validation
- · Verified Secure Software
- · SDLC (Software Development Life Cycle) Process
- · Secure SDLC
- · Specifics of Cloud Application Architecture
- · Secure IAM (Identity and Access Management) Solutions
Operations
- · Planning Process for the Data Center Design
- · Installation and Configuration of Physical Infrastructure for Cloud Environment
- · Running Physical Infrastructure for Cloud Environment
- · Managing Physical Infrastructure for Cloud Environment
- · Installation and Configuration of Logical Infrastructure for Cloud Environment
- · Running Logical Infrastructure for Cloud Environment
- · Managing Logical Infrastructure for Cloud Environment
- · Compliance with Regulations and Controls
- · Risk Assessment for Logical and Physical Infrastructure
- · Collection, Acquisition, and Preservation of Digital Evidence
- · Managing Communication with Stakeholders
Legal and Compliance
- · Legal Requirements and Unique Risks within the Cloud Environment
- · Relevant Privacy and PII Laws and Regulations
- · Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
- · Implications of Cloud to Enterprise Risk Management
- · Outsourcing and Cloud Contract Design
- · Vendor Management
Join Our Community