One-time payment for life and future updates

14 hours on-demand video

Access on mobile and TV

  • CCSP official exam preparation


Overview


The CCSP certification allows you to showcase your cloud knowledge and improve your organization’s security posture. It can also help you obtain an increase in compensation and create better positioning for new job opportunities.
Prerequisites for this CCSP Training
While there are no prerequisites for this course, it assumes that you have basic knowledge of information security and cloud concepts.
CCSP Course Goals
By the end of this CCSP course, students should be able to:

  • Know what the CCSP certification exam is about
  • Understand all six CCSP domains
  • Be prepared for the CCSP exam
In our Certified Cloud Security Professional (CCSP) course, you will obtain a complete understanding of security risks and mitigation strategies associated with data security in the cloud and become prepared to pass the CCSP certification exam.
What is CCSP?
CCSP is the acronym for Certified Cloud Security Professional. It is a fairly new certification, introduced in 2015 by the ISC2 and the Cloud Security Alliance (CSA), that was created due to the increased popularity of the cloud and the security risks that came along with it. The designation signifies that individuals who have earned it have a thorough understanding of the security associated with the cloud, but also with software, information and other cyber environments.
What Does this online CCSP Training Entail?
Our online Certified Cloud Security Professional course will provide you with the knowledge and skills to protect your organization’s cloud environment. With more and more companies moving information to the cloud, it has become crucial to have experts in cloud computing. This course will allow you to become one of those experts.
CCSP training covers all topics related to CCSP certification, preparing you to successfully pass the certification exam. Upon completion, you will have comprehensive knowledge to understand the security challenges that are common to different types of cloud services, to select and implement appropriate controls to ensure the security of cloud environments, and the ability to identify, evaluate, and mitigate risks to your organization's cloud environment. You will take an in-depth look at all six core domains of the CCSP common body of knowledge:
  • Architectural concepts and design requirements Cloud data security
  • Cloud platform and Infrastructure security
  • Cloud Application security
  • Operations
  • Legal and compliance
How Useful is CCSP Certification?
Obtaining your CCSP certification shows that you are a competent, knowledgeable, cloud security specialist who has hands-on experience in the field. Just by having the certification, you will be qualified for a number of job opportunities and a better salary.
Some of the common job titles for CCSP certified employees include:
  • Security Administrator
  • Security Manager
  • Security Architect
  • Cloud Security Engineer
  • Security Consultant
  • Systems Engineer
  • Systems Architect
  • Enterprise Architect
This, of course, isn’t an exhaustive list. The above job titles could potentially represent many different roles within an organization.
Becoming CCSP certified also means that you will likely be able to secure a higher salary than counterparts without certification. Exact salaries are hard to quote because the positions and organizations for CCSPs are so varied.
What Does a Certified Cloud Security Professional Do?
A major part of being a Certified Cloud Security Professional is identifying critical information and executing the measures that reduce or eliminate the risk of exploitation for organizations. Knowledge of cloud architecture is needed to run and manage it. Some of the responsibilities of a CCSP may include:
  • Building and implementing infrastructures for cloud environments
  • Operating and overseeing infrastructures for cloud environments
  • Managing physical infrastructures for cloud environments
  • Building and operating logical infrastructures for cloud environments
  • Ensuring compliance with regulation and controls
  • Conducting risk assessments of physical and logical infrastructures
  • Understanding how to acquire, collect and preserve digital evidence
  • Managing communication with and identifying relevant parties
  • Auditing and monitoring of tools, mechanisms, and facilities
What is Involved in the CCSP Certification Exam?
The CCSP certification exam is a three-hour exam with 125 multiple-choice questions. You must earn at least 700 out of 1,000 points to pass successfully. The exam covers the six CCSP domains, which are individually weighted as follows:
  • Cloud Concepts, Architecture, and Design
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Cloud Security Operations
  • Legal, Risk, and Compliance
You also must have the following to qualify for certification:
  • At least five years paid work experience in information technology
  • Three of the five years must consist of work in information security, and one year in one or more of the six domains (above)


WHO SHOULD ATTEND THIS COURSE?

  • Chief Information Security Officer (CISO)
  • Chief Security Officer (CSO)
  • Senior Security Engineer
  • Security Consultant
  • Security Manager
  • Security Auditor
  • Security Director
  • Security Architect
  • Network Architect
  • IT Director/Manager
  • Security Analyst
  • Security Systems Engineer

COURSE BENEFITS

  • Full CISSP® domains coverage
  • Pass your exam first time
  • Delivered by an industry professional
  • Free study guides, mock exams, exam simulator, and slides included
  • Expert support
  • Learn at your own pace
    • COURSE LEARNING OUTCOMES

    • SECURITY AND RISK MANAGEMENT
      • Understand and apply concepts of confidentiality, integrity and availability
      • Evaluate and apply security governance principles
      • Determine compliance requirements
      • Understand legal and regulatory issues that pertain to information security in a global context
      • Understand, adhere to, and promote professional ethics
      • Develop, document, and implement security policy, standards, procedures, and guidelines
      • Identify, analyze, and prioritize Business Continuity (BC) requirements
      • Contribute to and enforce personnel security policies and procedures
      • Understand and apply risk management concepts
      • Understand and apply threat modeling concepts and methodologies
      • Apply risk-based management concepts to the supply chain
      • Establish and maintain a security awareness, education, and training program

    • ASSET SECURITY
    • Identify and classify information and assets
    • Determine and maintain information and asset ownership
    • Protect privacy
    • Ensure appropriate asset retention
    • Determine data security controls
    • Establish information and asset handling requirements

  • SECURITY ARCHITECTURE AND ENGINEERING
    • Implement and manage engineering processes using secure design principles
    • Understand the fundamental concepts of security models
    • Select controls based upon systems security requirements
    • Understand security capabilities of information systems
    • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
    • Assess and mitigate vulnerabilities in web-based systems
    • Assess and mitigate vulnerabilities in mobile systems
    • Assess and mitigate vulnerabilities in embedded devices
    • Apply cryptography

    • COMMUNICATION AND NETWORK SECURITY
    • Implement secure design principles in network architectures
    • Secure network components
    • Implement secure communication channels according to design

  • IDENTITY AND ACCESS MANAGEMENT (IAM)
    • Control physical and logical access to assets
    • Manage identification and authentication of people, devices, and services
    • Integrate identity as a third-party service
    • Implement and manage authorization mechanisms
    • Manage the identity and access provisioning lifecycle

  • SECURITY ASSESSMENT AND TESTING
    • Design and validate assessment, test, and audit strategies
    • Conduct security control testing
    • Collect security process data (e.g., technical and administrative)
    • Analyze test output and generate report
    • Conduct or facilitate security audits

  • SECURITY OPERATIONS
    • Understand and support investigations
    • Understand requirements for investigation types
    • Conduct logging and monitoring activities
    • Securely provisioning resources
    • Understand and apply foundational security operations concepts
    • Apply resource protection techniques
    • Conduct incident management
    • Operate and maintain detective and preventative measures
    • Implement and support patch and vulnerability management
    • Understand and participate in change management processes
    • Implement recovery strategies
    • Implement Disaster Recovery (DR) processes
    • Test Disaster Recovery Plans (DRP)
    • Participate in Business Continuity (BC) planning and exercises
    • Implement and manage physical security
    • Address personnel safety and security concerns

  • SOFTWARE DEVELOPMENT SECURITY
    • Understand and integrate security in the Software Development Life Cycle (SDLC)
    • Identify and apply security controls in development environments
    • Assess the effectiveness of software security
    • Define and apply secure coding guidelines and standards
    • Assess security impact of acquired software

Course Curriculum

Mohamed Atef

Cyber Security Consultant / Certified Instructor with more than 20 years of experience.