close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Certified Cloud Security Professional Course Outline

Our CCSP course looks at the following areas:

Domain 1: Cloud Concepts, Architecture, and Design

Module 1: Understand Cloud Computing Concepts

  • Introduction to Cloud Computing
  • Benefits of Cloud Computing
  • Cloud Computing Definitions
  • Cloud Computing Roles
  • Key Cloud Computing Characteristics
  • Building Block Technologies

Module 2: Describe Cloud Reference Architecture

  • Cloud Reference Model
  • Conceptual Reference Model
  • Cloud Computing Activities
  • Cloud Service Capabilities
  • Deployment Models
  • Cloud Shared Considerations
  • Impact of Related Technologies

Module 3: Understand Security Concepts Relevant to Cloud Computing

  • Cryptography
  • Key Management
  • IAM and Access Control
  • Data and Media Sanitisation
  • Virtualisation Security
  • Common Threats
  • Network Security

Module 4: Understand Design Principles of Secure Cloud Computing

  • Cloud Secure Data Lifecycle
  • Cloud-Based Disaster Recovery (DR) Planning
  • Business Continuity Planning
  • Cost-Benefit Analysis
  • Security Considerations for Different Cloud Categories

Module 5: Identify Trusted Cloud Services

  • Certification Against Criteria

Domain 2: Cloud Data Security

Module 6: Describe Cloud Data Concepts

  • Cloud Data Life Cycle Phases
  • Data Dispersion

Module 7: Design and Implement Cloud Data Storage Architectures

  • Storage Types
  • Threats to Storage Types

Module 8: Design and Apply Data Security Technologies and Strategies

  • Encryption
  • Key Management
  • Hashing
  • Data De-identification
  • Data Masking
  • Tokenisation
  • Data Loss Prevention (DLP)

Module 9: Implement Data Discovery

  • Structured Data
  • Unstructured Data

Module 10: Implement Data Classification

  • Mapping
  • Labelling
  • Sensitive Data

Module 11: Design and Implement Information Rights Management (IRM)

  • Objectives
  • Provisioning
  • Access Models
  • Appropriate Tools

Module 12: Plan and Implement Data Retention, Deletion and Archiving Policies

  • Data Protection Policies
  • Data Retention Policies
  • Data Deletion Procedures and Mechanisms
  • Data Archiving Policies
  • Legal Hold

Module 13: Design and Implement Auditability, Traceability and Accountability of Data Events

  • Definition of Event Sources
  • Requirement of Identity Attribution
  • Logging
  • Storage and Analysis of Data Events
  • Chain of Custody and Nonrepudiation

Domain 3: Cloud Platform Infrastructure Security

Module 14: Comprehend Cloud Infrastructure Components

  • Cloud Infrastructure
  • Physical Environment
  • Network and Communications
  • Compute Parameters of a Cloud Server
  • Virtualisation
  • Storage
  • Management Plane

Module 15: Design a Secure Data Centre

  • Logical Design
  • Physical Design
  • Environmental Design

Module 16: Analyse Risks Associated with Cloud Infrastructure

  • Risk Assessment and Analysis
  • Virtualisation Risks
  • Counter-Measure Strategies

Module 17: Design and Plan Security Controls

  • Physical and Environmental Protection
  • System and Communication Protection
  • Virtualisation Systems Protection
  • Identification, Authentication, and Authorisation in Cloud Infrastructure
  • Audit Mechanisms

Module 18: Plan Disaster Recovery and Business Continuity Management

  • Risks Related to the Cloud Environment
  • Business Requirements
  • Business Continuity/Disaster Recovery Strategy
  • Creation, Implementation, and Testing of Plan

Domain 4: Cloud Application Security

Module 19: Advocate Training and Awareness for Application Security

  • Cloud Development Basics
  • Common Pitfalls
  • Common Cloud Vulnerabilities

Module 20: Describe the Secure Software Development Life Cycle (SDLC) Process

  • Business Requirements
  • Phases and Methodologies

Module 21: Apply the Secure Software Development Life Cycle (SDLC)

  • Cloud-Specific Risks
  • Threat Modelling
  • Software Configuration Management and Versioning
  • Quality of Service (QoS)

Module 22: Apply Cloud Software Assurance and Validation

  • Functional Testing
  • Security Testing Methodologies

Module 23: Use Verified Secure Software

  • Approved API
  • Supply-Chain Management
  • Validated Open Source Software

Module 24: Comprehend the Specifics of Cloud Application Architecture

  • Supplement Security Devices
  • Cryptography
  • Sandboxing
  • Application Virtualisation
  • Orchestration

Module 25: Design Appropriate Identity and Access Management (IAM) Solutions

  • Federated Identity
  • Identity Providers
  • Single Sign-On (SSO)
  • Multifactor Authentication
  • Cloud Access Security Broker (CASB)

Domain 5: Cloud Security Operations

Module 26: Implement and Build Physical and Logical Infrastructure for Cloud Environment

  • Hardware Specific Security Configuration Requirements
  • Installation and Configuration of Virtualisation Management Tools
  • Virtual Hardware Specific Security Configuration Requirements
  • Installation of Guest Operating System (OS) Virtualisation Toolsets

Module 27: Operate Physical and Logical Infrastructure for Cloud Environment

  • Configure Access Control for Local and Remote Access
  • Securing Network Configuration
  • Dynamic Host Configuration Protocol
  • Securing Network Configuration
  • Operating System (OS) Hardening Through the Application of Baselines
  • Availability of Stand-Alone Hosts
  • Availability of Clustered Hosts
  • Availability of the Guest OS

Module 28: Manage Physical and Logical Infrastructure for Cloud Environment

  • Access Control for Remote Access
  • Operating System (OS) Baseline Compliance Monitoring and Remediation
  • Patch Management
  • Performance and Capacity Monitoring
  • Hardware Monitoring
  • Configuration of Host and Guest Operating System (OS) Backup and Restore Functions
  • Implementation of Network Security Controls

Module 29: Implement Operational Controls and Standards

  • Overview
  • Change Management
  • Continuity Management
  • Information Security Management
  • Continual Service Improvement Management
  • Incident Management
  • Problem Management
  • Release and Deployment Management
  • Configuration Management
  • Service Level Management
  • Availability Management
  • Capacity Management

Module 30: Support Digital Forensics

  • Support Digital Forensics
  • Forensic Data Collection Methodologies
  • Evidence Management
  • Collect, Acquire and Preserve Digital Evidence

Module 31: Manage Communication with Relevant Parties

  • Vendors
  • Customers
  • Partners
  • Regulators
  • Other Stakeholders

Module 32: Manage Security Operations

  • Security Operations Center (SOC)
  • Log Capture and Analysis

Domain 6: Legal, Risk and Compliance

Module 33: Articulate Legal Requirements and Unique Risks within the Cloud Environment

  • Conflicting International Legislation
  • Evaluation of Legal Risks Specific to Cloud Computing
  • Legal Framework and Guidelines
  • eDiscovery
  • Forensics Requirements

Module 34: Understand Privacy Issues

  • Contractual and Regulated PII
  • Country-Specific Legislation and Regulation of PII
  • Difference between Confidentiality, Authentication, and Integrity
  • Standard Privacy Requirements

Module 35: Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment

  • Internal and External Audit Control
  • Impact of Audit Requirements
  • Identify Assurance Challenges of Virtualisation and Cloud
  • Types of Audit Reports
  • Restrictions of Audit Scope Statements
  • Gap Analysis
  • Audit Planning
  • Internal Information Security Management System (ISMS)
  • Internal Information Security Controls System
  • Policies
  • Identification and Involvement of Relevant Stakeholders
  • Specialised Compliance Requirements for Highly-Regulated Industries
  • Impact of Distributed IT Models

Module 36: Understand Implications of Cloud to Enterprise Risk Management

  • Assess Providers Risk Management Programs
  • Difference
  • Regulatory Transparency Requirements
  • Risk Treatment
  • Different Risk Frameworks
  • Metrics for Risk Management
  • Assessment of the Risk Environment

Module 37: Understand Outsourcing and Cloud Contract Design

  • Business Requirements
  • Vendor Management
  • Contract Management
  • Supply Chain Management
  • Implementation of Network Security Controls
  • Management Plane

Show moredowndown

Who should attend this CCSP Training Course?

This CCSP course is aimed at IT professionals that want to enhance their knowledge of Cloud Security, including:

  • IT and Cloud Security Experts.
  • Enterprise Architects.
  • Security Consultants.
  • Systems Engineers.
  • Security Administrators.

Prerequisites

There are no formal prerequisites, however having some background knowledge of IT would be useful.

Certified Cloud Security Professional Course Overview

CCSP training refers to building, managing, and protecting data and infrastructure in the cloud following best practices, policies, and procedures specified by (ISC)² cybersecurity experts. It provides various advantages, including credibility and recognition as a cloud security authority figure, the ability to keep current on the newest cloud security practices and principles, and exposure to various cloud platforms and technologies. Delegates will understand the audit process, methodologies, and required adaptations for a cloud environment. Holding the skills and knowledge to manage cloud security will lead the delegates to accomplish numerous job profiles such as Security Architects/Engineers, Security Managers/Engineers/Architects/Consultants, Security Administrators, Enterprise Architects. These obtained positions will help individuals climb the ladder of success and substantial earnings in their careers.

In this 5-day CCSP (Certified Cloud Security Professional) training course, delegates will comprehend knowledge about moving the data, infrastructure, and apps from on-premises hardware to the cloud to help the hybrid workforce be more productive. Delegates will lay their hands-on approach with protecting the organisation’s information assets from cybercriminals against insider threats and human mistakes, which are still among the primary causes of data breaches today. Our highly expert trainer with abundant knowledge will teach the delegates to identify information security risks and apply data security methods to reduce security threats in cloud storage.

It also accommodates the delegates with the acquainted concepts related to the security of the cloud, such as:

  • Data and media sanitisation.
  • Virtualisation security.
  • Data de-identification.
  • Data masking.
  • Environmental design.

At the end of this training course, delegates will be able to design and implement cloud data storage architectures, inaccessible interfaces, metered resources, and scalability. They will also be able to design and apply auditability, traceability, and accountability of data events in cloud security.

Show moredowndown

CCSP Certified Cloud Security Professional Exam Information

This course prepares individuals to successfully apply and sit the official CCSP Certified Cloud Security exam - a signifier of cloud security excellence. To enrol in the CCSP exam, delegates must have a minimum of five years IT experience. Delegates must also have three years of experience in security information and a minimum of one year in cloud computing.

What’s Included in this CCSP Training Course?

  • The Knowledge Academy’s Certified Cloud Security Professional Manual
  • Experienced CCSP Instructor
  • Certificate of Completion
  • Refreshments

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

CCSP Certified Cloud Security Professional FAQs

FAQ's

No, you do not need any prior qualifications to take part in our CCSP course.
Our CCSP trainers have years of experience teaching delegates and are experts in Cloud Security.
We offer CCSP training courses in a range of locations across the UK and around the world, making it easy to find a training venue near you.
Cloud Security is required because it helps in recognising strategies to classify data, protect data, manage, and ensure privacy, and it also helps in defending against cyber threats.
Certified Cloud Security Professional (CCSP) certification is planned to develop an IT professional's knowledge and application of Cloud Security methodology.
Cloud Security refers to a wide range of strategies and policies designed to provide control over the security of applications and cloud system apps. Cloud services allow users to create a platform for real-time information to be acquired and a place for a business owner to interact with.
The six CSSP domains are: - 1) Cloud data security. 2) Architecture and design. 3) Operations. 4) Infrastructure security. 5) Application security. 6) Compliance.
Individuals opting for our very knowledgeable training course to gain hands-on experience and a thorough understanding of cloud security, including its design, service orchestration, and operation.
The great majority of enterprises have shifted to the cloud to benefit from quick deployment, scalability, and user empowerment.
Attending this CCSP (Certified Cloud Security Professional) training course will lead you to attain greater job roles such as Security Architects/Engineers, Security Managers/Engineers/Architects/Consultants, Security Administrators, Enterprise Architects to upgrade your career ahead.
During this CCSP (Certified Cloud Security Professional) training course, you will understand the implications of cloud to enterprise risk management, identify assurance challenges of virtualisation and cloud, evaluation of legal risks specific to cloud computing, continual service improvement management, installation and configuration of virtualisation management tools, forensic data collection methodologies, and many other related topics to increase your calibre.
The price for CCSP Certified Cloud Security Professional certification in the United Kingdom starts from £1995
The Knowledge Academy is the Leading global training provider for CCSP Certified Cloud Security Professional.
Please see our CCSP Training courses available in the United Kingdom

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo
backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on 01344203999 and speak to our training experts, we should be able to help you with your requirements.