Training Courses

search courses

CCSP: Certified Cloud Security Professional

Guaranteed to Run Scheduled Fully Booked
Location
Auldhouse Anywhere
Jun 2022
20
Aug 2022
1
Sep 2022
12
Code: CCSP
Length: 5 Days
Overview

Gain core knowledge and experience to successfully secure the cloud and prepare for the Certified Cloud Security Professional (CCSP®) certification.

Delivery format(s)
On-Site
On-Site
Classroom
Classroom
Anywhere
Anywhere
OBJECTIVES

This class will run virtually from Australia, note timings will be 11am-7pm NZT.

Gain core knowledge and experience to successfully secure the cloud and prepare for the Certified Cloud Security Professional (CCSP®) certification.

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration.

This professional competence is measured against a globally recognised body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional (CISSP®).

Exam purchased separately. You may add this to your booking for an additional $920.

PREREQUISITES

Candidates must have a minimum of five years cumulative work experience in information technology, of which three years must be in information security and one year in one or more of the six domains of the CCSP CBK® (Common Body of Knowledge). Earning CSA’s CCSK certificate can be substituted for one year of experience in one or more of the six domains of the CCSP CBK. Earning (ISC)²’s CISSP credential can be substituted for the entire CCSP experience requirement.

A candidate who doesn’t have the required experience to become a CCSP may become an Associate of (ISC)² by successfully passing the CCSP examination. The Associate of (ISC)² will then have six years to earn the five years required experience.

WHAT YOU’LL LEARN

The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

WHO SHOULD ATTEND

The CCSP is ideal for experienced cybersecurity and IT/ICT professionals who are involved in transitioning to and maintaining cloud-based solutions and services. Roles include:

  • Enterprise Architect
  • Security Administrator
  • Systems Engineer
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Manager
  • Systems Architect

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please contact us on 0800 835 835.

COURSE OUTLINE

This course provides in-depth coverage of the six domains required to prepare for the CCSP exam. Refer to the CCSP Exam Outline for a deeper dive into the CCSP domains.

1. Cloud Concepts, Architecture and Design

  • Understand Cloud Computing Concepts
  • Describe Cloud Reference Architecture
  • Understand Security Concepts Relevant to Cloud Computing
  • Understand Design Principles of Secure Cloud Computing
  • Evaluate Cloud Service Providers

2. Cloud Data Security

  • Describe Cloud Data Concepts
  • Design and Implement Cloud Data Storage Architectures
  • Design and Apply Data Security Technologies and Strategies
  • Implement Data Discovery
  • Implement Data Classification
  • Design and Implement Information Rights Management (IRM)
  • Plan and Implement Data Retention, Deletion and Archiving Policies
  • Design and Implement Auditability, Traceability and Accountability of Data Events

3. Cloud Platform and Infrastructure Security

  • Comprehend Cloud Infrastructure Components
  • Design a Secure Data Centre
  • Analyse Risks Associated with Cloud Infrastructure
  • Design and Plan Security Controls
  • Plan Disaster Recovery (DR) and Business Continuity (BC)

4. Cloud Application Security

  • Advocate Training and Awareness for Application Security
  • Describe the Secure Software Development Life Cycle (SDLC) Process
  • Apply the Secure Software Development Life Cycle (SDLC)
  • Apply Cloud Software Assurance and Validation
  • Use Verified Secure Software
  • Comprehend the Specifics of Cloud Application Architecture
  • Design Appropriate Identity and Access Management (IAM) Solutions

5. Cloud Security Operations

  • Implement and Build Physical and Logical Infrastructure for Cloud Environment
  • Operate Physical and Logical Infrastructure for Cloud Environment
  • Manage Physical and Logical Infrastructure for Cloud Environment
  • Implement Operational Controls and Standards (e.g. ITIL®, ISO/IEC 20000-1
  • Support Digital Forensics
  • Manage Communication with Relevant Parties
  • Manage Security Operations

6. Legal, Risk and Compliance

  • Articulate Legal Requirements and Unique Risks within the Cloud Environment
  • Understand Privacy Issues
  • Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
  • Understand Implications of Cloud to Enterprise Risk Management
  • Understand Outsourcing and Cloud Contract Design

About (ISC)²

(ISC)²: The world’s leading cybersecurity and IT security professional organisation.
(ISC)² is an international, not for profit membership association for information security leaders. It is committed to helping their members grow, learn and thrive. With more than 140,000 certified members, it empowers professionals who touch every aspect of information security.
Is your course supplied by an Official (ISC)² Training Provider?
Auldhouse is one of only a few in Australasia who offer official (ISC)² courseware and materials. You wouldn’t update your company’s security policies with versions that were 12-18 months out of date…. By choosing an Official Training Provider, you are guaranteed the very latest in defence strategies and content that is mapped directly to the exam.

Enquiry Form