0% found this document useful (0 votes)
26 views4 pages

CCSP

This document outlines a comprehensive training program for the (ISC)² Certified Cloud Security Professional (CCSP) certification, covering various cloud concepts, security practices, and architecture over seven weeks. Each week focuses on different aspects of cloud security, including data protection, risk management, and compliance with standards. The training prepares learners for the CCSP exam by providing in-depth knowledge of cloud technologies and security measures.

Uploaded by

sfsaf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

CCSP

This document outlines a comprehensive training program for the (ISC)² Certified Cloud Security Professional (CCSP) certification, covering various cloud concepts, security practices, and architecture over seven weeks. Each week focuses on different aspects of cloud security, including data protection, risk management, and compliance with standards. The training prepares learners for the CCSP exam by providing in-depth knowledge of cloud technologies and security measures.

Uploaded by

sfsaf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

WEEK 1 Cloud Concepts and Architecture 161 min.

Cloud Computing Roles 5

(ISC)² CCSP – Certified Cloud Computing Characteristics


Cloud Deployment Models
8
14

Cloud Security Infrastructure as a Service (IaaS)


Platform as a Service (PaaS)
5
3

Professional Software as a Service (SaaS) 7


Shared Responsibility 6
Impact From Emerging Technologies 13
This CCSP training covers how to effectively secure cloud data
security, data infrastructure and and applications security. This Security Concepts and the Cloud
intermediate ISC2 CCSP training prepares learners to take the CCSP
Overview 1
exam, which is the one required exam to earn the ISC2 Certified Cloud Cryptography and Key Management 15
Security Professional (CCSP) certification. Access Control with IAM 10
Data and Media Sanitization 8
CBT Nuggets course material
Network and Virtualization Security 16
Common Threats in the Cloud 13

Secure Cloud Computing Design Principles

Overview 1
Cloud Secure Data Lifecycle 7
Data Governance 11
Cloud Based DR and BC 16

WEEK 2 156 min.


Cost Benefit Analysis 9
Functional Requirements 5
Security Considerations for Different Cloud 10 Data Loss Prevention (DLP) 9
Categories
Data Discovery, Classification and IRM
Evaluating Cloud Service Providers
Overview 1
Overview 1
Data Discovery 5
Evaluating Cloud Service Providers 4
Data Discovery Techniques and Issues 7
ISO/IEC 27017 10
Data Classification 8
PCI-DSS 6
Information Rights Management (IRM) 11
ENISA 10
Data Retention and Deletion 5
CSA STAR 9
Data Archival 5
Additional Standards 12
Logs and Auditability 7

Cloud Data Concepts and Storage Architecture Log Storage 6


Chain of Custody and Non-Repudiation 6
Overview 1
Cloud Data Lifecycle 13 Cloud Infrastructure Components
Data Functions 12
Overview 1
Data Dispersion 8
Intro 1
Cloud Storage Types 13
Physical Environment 12
Threats to Storage 12
Networking and Communications 13

Data Security Technologies Compute and Storage 12


Virtualization 6
Overview 1
Management Plane 8
The Encryption Process and the Cloud 8
IaaS Data Encryption Options 9

WEEK 4 Secure Datacenter Design 152 min.

WEEK 3 151 min. Overview 1

Key Management 9 Intro 1

Data Hashing 6 Datacenter Services 8

Data Obfuscation and Anonymization 10 Datacenter Security 11


Secure SDLC Process and Application
Physical Design 7
Overview 1
Temperature and Humidity 7
Business Requirements 7
The Importance of Airflow 9
Phases of the SDLC 7
Multi-Vendor Pathway Connectivity 4
Development Methodologies 6

Cloud Infrastructure Risk and Security Cloud Specific Risks 11


Threat Modeling 13
Overview 1
Secure Coding Techniques 6
Risk Assessments 12
Cloud Infrastructure Risk and Security 12 Application Security and Software Assurance
Cloud Specific Risks 6
Overview 1
Virtualization Risks 7
Intro 1
Countermeasure Strategies 7
Common Cloud Application Vulnerabilities 8
Physical and Environmental Protection 6
Cloud Development Basics 9
System and Communication Protection 10
Functional and Non-Functional Testing 4

Protecting Virtualized Systems and BCDR Security Testing Methodologies 9


Quality Assurance 7
Overview 1
Abuse Case Testing 5
Protecting Virtualized Systems 11
Identification, Authentication and Authorization 8 Cloud Application Architecture and IAM
Audit Mechanisms 9
Overview 1
Risks Related to the Cloud and BCDR 12
Supplemental Security Components 16
Cryptography and Applications 11

WEEK 5 157 min.


Business Requirements for BCDR 9
WEEK 6 151 min.
BCDR Strategy and Planning 14
Application Virtualization and Orchestration 11
BCDR Testing 8
Federated Identity, MFA, OTP and SSO 11
CASB and Secrets Management 8
Implement Cloud Infrastructure
Skill Review 12
Overview 1
Hardware Specific Security Configurations 9 Auditing in the Cloud
Security Configurations 6
Overview 1
Virtualization Toolset 5
Intro: Auditing in the Cloud 1
Controlling Access 8
Audit Controls and Assurance 8
Securing the Network 13
Audit Reports 7
Operating System Security 5
Gap Analysis and Audit Planning 7
Stand Alone Hosts in the Cloud 5
ISMS and ISCS 5

Managing Cloud Infrastructure Policies 4


Identification and Involvement of Relevant 3
Managing It All 7 Stakeholders
Backups and Availability 10 Specialized Compliance Requirements 5
Operational Controls and Standards 8 Impact of a Distributed IT Model 5
Supporting Digital Forensics 15
Managing Communications 6 Risk Management and Cloud Contract Design
Managing Security Operations 9 Overview 1
Assessing Risk Management and Data Roles 8
Legal, Risk and Privacy in the Cloud
Regulatory Transparency and Risk Treatment 8
Overview 1 Risk Frameworks, Metrics and Environments 7
Intro to Legal, Risk and Privacy in the Cloud 1 Business Requirements and Vendor Management 11
Legal Requirements and Unique Risks in the Cloud 5 Contract Management 7
Legal Frameworks and Guidelines 4 Supply Chain Management 7

WEEK 7 142 min.


E-Discovery and Forensic Requirements 9
Contractual vs Regulated Private Data 3
Country-Specific Legislation of Data Privacy 11
Privacy Standards and PIAs 9

Last updated 12.3.2024

You might also like