WEEK 1   Cloud Concepts and Architecture            161 min.
Cloud Computing Roles                            5
(ISC)² CCSP – Certified                                                          Cloud Computing Characteristics
                                                                                 Cloud Deployment Models
                                                                                                                                  8
                                                                                                                                 14
Cloud Security                                                                   Infrastructure as a Service (IaaS)
                                                                                 Platform as a Service (PaaS)
                                                                                                                                  5
                                                                                                                                  3
Professional                                                                     Software as a Service (SaaS)                     7
                                                                                 Shared Responsibility                            6
                                                                                 Impact From Emerging Technologies               13
This CCSP training covers how to effectively secure cloud data
security, data infrastructure and and applications security. This                Security Concepts and the Cloud
intermediate ISC2 CCSP training prepares learners to take the CCSP
                                                                                 Overview                                         1
exam, which is the one required exam to earn the ISC2 Certified Cloud            Cryptography and Key Management                 15
Security Professional (CCSP) certification.                                      Access Control with IAM                         10
                                                                                 Data and Media Sanitization                      8
CBT Nuggets course material
                                                                                 Network and Virtualization Security             16
                                                                                 Common Threats in the Cloud                     13
                                                                                 Secure Cloud Computing Design Principles
                                                                                 Overview                                         1
                                                                                 Cloud Secure Data Lifecycle                      7
                                                                                 Data Governance                                 11
                                                                                 Cloud Based DR and BC                           16
                                                                        WEEK 2                                              156 min.
                                                                                 Cost Benefit Analysis                            9
                                                                                 Functional Requirements                          5
         Security Considerations for Different Cloud         10             Data Loss Prevention (DLP)                     9
         Categories
                                                                            Data Discovery, Classification and IRM
         Evaluating Cloud Service Providers
                                                                            Overview                                       1
         Overview                                             1
                                                                            Data Discovery                                 5
         Evaluating Cloud Service Providers                   4
                                                                            Data Discovery Techniques and Issues           7
         ISO/IEC 27017                                       10
                                                                            Data Classification                            8
         PCI-DSS                                              6
                                                                            Information Rights Management (IRM)           11
         ENISA                                               10
                                                                            Data Retention and Deletion                    5
         CSA STAR                                             9
                                                                            Data Archival                                  5
         Additional Standards                                12
                                                                            Logs and Auditability                          7
         Cloud Data Concepts and Storage Architecture                       Log Storage                                    6
                                                                            Chain of Custody and Non-Repudiation           6
         Overview                                             1
         Cloud Data Lifecycle                                13             Cloud Infrastructure Components
         Data Functions                                      12
                                                                            Overview                                       1
         Data Dispersion                                      8
                                                                            Intro                                          1
         Cloud Storage Types                                 13
                                                                            Physical Environment                          12
         Threats to Storage                                  12
                                                                            Networking and Communications                 13
         Data Security Technologies                                         Compute and Storage                           12
                                                                            Virtualization                                 6
         Overview                                             1
                                                                            Management Plane                               8
         The Encryption Process and the Cloud                 8
         IaaS Data Encryption Options                         9
                                                                   WEEK 4   Secure Datacenter Design                 152 min.
WEEK 3                                                  151 min.            Overview                                       1
         Key Management                                       9             Intro                                          1
         Data Hashing                                         6             Datacenter Services                            8
         Data Obfuscation and Anonymization                  10             Datacenter Security                           11
                                                                                Secure SDLC Process and Application
         Physical Design                                          7
                                                                                Overview                                             1
         Temperature and Humidity                                 7
                                                                                Business Requirements                                7
         The Importance of Airflow                                9
                                                                                Phases of the SDLC                                   7
         Multi-Vendor Pathway Connectivity                        4
                                                                                Development Methodologies                            6
         Cloud Infrastructure Risk and Security                                 Cloud Specific Risks                                11
                                                                                Threat Modeling                                     13
         Overview                                                 1
                                                                                Secure Coding Techniques                             6
         Risk Assessments                                        12
         Cloud Infrastructure Risk and Security                  12             Application Security and Software Assurance
         Cloud Specific Risks                                     6
                                                                                Overview                                             1
         Virtualization Risks                                     7
                                                                                Intro                                                1
         Countermeasure Strategies                                7
                                                                                Common Cloud Application Vulnerabilities             8
         Physical and Environmental Protection                    6
                                                                                Cloud Development Basics                             9
         System and Communication Protection                     10
                                                                                Functional and Non-Functional Testing                4
         Protecting Virtualized Systems and BCDR                                Security Testing Methodologies                       9
                                                                                Quality Assurance                                    7
         Overview                                                 1
                                                                                Abuse Case Testing                                   5
         Protecting Virtualized Systems                          11
         Identification, Authentication and Authorization         8             Cloud Application Architecture and IAM
         Audit Mechanisms                                         9
                                                                                Overview                                             1
         Risks Related to the Cloud and BCDR                     12
                                                                                Supplemental Security Components                    16
                                                                                Cryptography and Applications                       11
WEEK 5                                                      157 min.
         Business Requirements for BCDR                           9
                                                                       WEEK 6                                                  151 min.
         BCDR Strategy and Planning                              14
                                                                                Application Virtualization and Orchestration        11
         BCDR Testing                                             8
                                                                                Federated Identity, MFA, OTP and SSO                11
                                                                                CASB and Secrets Management                          8
         Implement Cloud Infrastructure
                                                                       Skill Review                                                     12
         Overview                                                 1
         Hardware Specific Security Configurations                9    Auditing in the Cloud
         Security Configurations                                  6
                                                                       Overview                                                           1
         Virtualization Toolset                                   5
                                                                       Intro: Auditing in the Cloud                                       1
         Controlling Access                                       8
                                                                       Audit Controls and Assurance                                       8
         Securing the Network                                    13
                                                                       Audit Reports                                                      7
         Operating System Security                                5
                                                                       Gap Analysis and Audit Planning                                    7
         Stand Alone Hosts in the Cloud                           5
                                                                       ISMS and ISCS                                                      5
         Managing Cloud Infrastructure                                 Policies                                                           4
                                                                       Identification and Involvement of Relevant                         3
         Managing It All                                          7    Stakeholders
         Backups and Availability                                10    Specialized Compliance Requirements                                5
         Operational Controls and Standards                       8    Impact of a Distributed IT Model                                   5
         Supporting Digital Forensics                            15
         Managing Communications                                  6    Risk Management and Cloud Contract Design
         Managing Security Operations                             9    Overview                                                           1
                                                                       Assessing Risk Management and Data Roles                           8
         Legal, Risk and Privacy in the Cloud
                                                                       Regulatory Transparency and Risk Treatment                         8
         Overview                                                 1    Risk Frameworks, Metrics and Environments                          7
         Intro to Legal, Risk and Privacy in the Cloud            1    Business Requirements and Vendor Management                      11
         Legal Requirements and Unique Risks in the Cloud         5    Contract Management                                                7
         Legal Frameworks and Guidelines                          4    Supply Chain Management                                            7
WEEK 7                                                      142 min.
         E-Discovery and Forensic Requirements                    9
         Contractual vs Regulated Private Data                    3
         Country-Specific Legislation of Data Privacy            11
         Privacy Standards and PIAs                               9
                                                                                                                     Last updated 12.3.2024