Course Code: bespokeccskmt
Duration: 21 hours
Overview:

Cloud Computing Security Knowledge (CCSK) Preparation Course

The CCSK course is intended to provide understanding of security issues and best practices over a broad range of cloud computing domains. As cloud computing is becoming the dominant IT system, CCSK is applicable to a wide variety of IT and information security jobs in virtually every organization. The CCSK is strongly recommended for IT auditors, system administrators, security professionals with at least 5 years of experience

After completing this course, the student will be able to:

  • Validate their competence gained through experience in cloud security
  • Prepare for the CCSK exam.
  • Demonstrate their technical knowledge, skills, and abilities to effectively develop a holistic cloud security program relative to globally accepted standards
  • Differentiate themselves from other candidates for desirable employment in the fast-growing cloud security market
  • Gain access to valuable career resources, such as tools, networking and ideas exchange with peers
  • Protect against threats with qualified professionals who have the expertise to competently design, build, and maintain a secure cloud business environmen

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
Course Outline:

Day 1

1. Cloud Computing Concepts and Architecture

a) Definitions of Cloud Computing

  • Service Models
  • Deployment Models
  • Reference and Architecture Models
  • Logical Mode

b) Cloud Security Scope, Responsibilities, and Models

c) Areas of Critical Focus in Cloud Security

2. Governance and Enterprise Risk Management

a) Tools of Cloud Governance

b) Enterprise Risk Management in the Cloud

c) Effects of various Service and Deployment Models

d) Cloud Risk Trade-offs and Tools

3. Legal Issues, Contracts and Electronic Discovery

a) Legal Frameworks Governing Data Protection and Privacy

  • Cross-Border Data Transfer
  • Regional Considerations

b) Contracts and Provider Selection

  • Contracts
  • Due Diligence
  • Third-Party Audits and Attestations

c) Electronic Discovery

  • Data Custody
  • Data Preservation
  • Data Collection
  • Response to a Subpoena or Search Warrant

4. Compliance and Audit Management

a) Compliance in the Cloud

  • Compliance impact on cloud contracts
  • Compliance scope
  • Compliance analysis requirements

b) Audit Management in the Cloud

  • Right to audit
  • Audit scope
  • Auditor requirements

Day 2

 5. Information Governance

a) Governance Domains

b) Six phases of the Data Security Lifecycle and their key elements

c) Data Security Functions, Actors and Controls

6. Management Plane and Business Continuity

a) Business Continuity and Disaster Recovery in the Cloud

b) Architect for Failure

c) Management Plane Security

7. Infrastructure Security

a) Cloud Network Virtualization

b) Security Changes with Cloud Networking

c) Challenges of Virtual Appliances

d) SDN Security Benefits

e) Micro-segmentation and the Software Defined Perimeter

f) Hybrid Cloud Considerations

g) Cloud Compute and Workload Security

8. Virtualization and Containers

a) Major Virtualizations Categories

b) Network

c) Storage

d) Containers

Day 3

9. Incident Response

a) Incident Response Lifecycle

b) How the Cloud Impacts IR

10. Application Security

a) Opportunities and Challenges

b) Secure Software Development Lifecycle

c) How Cloud Impacts Application Design and Architectures

d) The Rise and Role of DevOps

11. Data Security and Encryption

a) Data Security Controls

b) Cloud Data Storage Types

c) Managing Data Migrations to the Cloud

d) Securing Data in the Cloud

12. Identity, Entitlement, and Access Management

a) IAM Standards for Cloud Computing

b) Managing Users and Identities

c) Authentication and Credentials

d) Entitlement and Access Management

13. Security as a Service

a) Potential Benefits and Concerns of SecaaS

b) Major Categories of Security as a Service Offerings

14. Related Technologies

a) Big Data

b) Internet of Things

c) Mobile

d) Serverless Computing

Sites Published:

Qatar - Cloud Computing Security Knowledge (CCSK) Preparation Course

Nederland - Cloud Computing Security Knowledge (CCSK) Preparation Course

Malta - Cloud Computing Security Knowledge (CCSK) Preparation Course

Kazakhstan - Cloud Computing Security Knowledge (CCSK) Preparation Course

Moldova - Cloud Computing Security Knowledge (CCSK) Preparation Course

Morocco - Cloud Computing Security Knowledge (CCSK) Preparation Course

Tunisia - Cloud Computing Security Knowledge (CCSK) Preparation Course

Kuwait - Cloud Computing Security Knowledge (CCSK) Preparation Course

Oman - Cloud Computing Security Knowledge (CCSK) Preparation Course

Slovakia - Cloud Computing Security Knowledge (CCSK) Preparation Course

Kenya - Cloud Computing Security Knowledge (CCSK) Preparation Course

Nigeria - Cloud Computing Security Knowledge (CCSK) Preparation Course

Botswana - Cloud Computing Security Knowledge (CCSK) Preparation Course

Slovenia - Cloud Computing Security Knowledge (CCSK) Preparation Course

Croatia - Cloud Computing Security Knowledge (CCSK) Preparation Course

Serbia - Cloud Computing Security Knowledge (CCSK) Preparation Course

Bhutan - Cloud Computing Security Knowledge (CCSK) Preparation Course

Nepal - Cloud Computing Security Knowledge (CCSK) Preparation Course

Uzbekistan - Cloud Computing Security Knowledge (CCSK) Preparation Course