This Course is part of a Career Path: Become a Cyber Security Engineer

Course Content

Module 1: Architectural Concepts and Design Requirements

04:28
1.1 Domain 1 Overview
11:08
1.2 Introduction to Cloud Concepts
03:23
1.3 Cloud Computing NIST SP 800-145
03:58
1.4 Characteristics of Cloud Computing
05:47
1.5 NIST's 5 Cloud Actors
05:13
1.6 Cloud Actors and Functions
08:23
1.7 Security Risks
08:16
1.8 Cloud Deployment Models CCSP
01:51
1.9 Cloud Service Models Part 1: Overview
07:38
1.10 Cloud Service Models Part 2: SaaS
04:04
1.11 Cloud Service Models Part 3: PaaS
12:35
1.12 Cloud Service Models Part 4: IaaS
14:19
1.13 Pizza as a Service
02:22
1.14 Cloud Computing Standards Roadmap Part 1
14:50
1.15 Cloud Computing Standards Roadmap Part 2
05:42
1.16 General Security Requirements
07:02
1.17 Data States
05:20
1.18 Removing Data Remnants
04:24
1.19 Access Control
03:27
1.20 Steps to Identity and Access Management
03:59
1.21 Identity Proofing and Account Provisioning Part 1
07:00
1.22 Identity Proofing and Account Provisioning Part 2
01:45
1.23 API's, SPML and SCIM
02:58
1.24 Subject Identification
04:54
1.25 Authentication
01:35
1.26 Authorization
02:24
1.27 Auditing/Accountability and Account Deprovisioning
04:19
1.28 Virtualization
03:03
1.29 Hypervisor Security
06:09
1.30 Common Threats
02:10
1.31 Domain 1 Review

Module 2: Cloud Data Security

02:12
2.1 Domain 2 Overview
04:25
2.2 Data Security Lifecycle
05:29
2.3 Storage Architectures
03:01
2.4 Data Discovery Techniques
02:17
2.5 Threats to Data Storage
03:13
2.6 Unauthorized User Access Part 1: Overview
04:14
2.7 Unauthorized User Access Part 2: Data Classification
01:52
2.8 Unauthorized User Access Part 3: Strong Authentication
06:27
2.9 Unauthorized User Access Part 4: Information Rights Management
05:39
2.10 Unauthorized User Access Part 5: Encryption
04:52
2.11 Unauthorized User Access Part 6: Masking, Obfuscation, Anonymization and Tokenization
01:33
2.12 Unauthorized User Access Part 7: Data Loss Prevention (DLP)
01:55
2.13 Unauthorized User Access Part 8: Trusted Platform Model (TPM) Chips
01:15
2.14 Unauthorized User Access Part 9: Anti-Malware
03:25
2.15 Unauthorized User Access Part 10: Removing Data Remnants
02:42
2.16 Unauthorized User Access Part 11: Monitoring
06:51
2.17 Liability Issues
06:18
2.18 Denial of Service
05:03
2.19 Integrity Issues
04:21
2.20 Cloud Security Alliance Cloud Controls Matrix
01:30
2.21 Policy Controls for Privacy and Data Protection
01:42
2.22 Domain 2 Review

Module 3: Cloud Platform and Infrastructure Security

01:38
3.1 Domain 3 Overview
06:10
3.2 Physical Environment of the Cloud Infrastructure
04:11
3.3 Network Functionality
08:15
3.4 Software Defined Networking
05:31
3.5 Hypervisors: TYPE I and TYPE II
03:18
3.6 Securing the Guest OS
08:45
3.7 Virtualization Concerns
05:38
3.8 Object Storage
07:53
3.9 Risk Assessment and Analysis in the Cloud
03:23
3.10 Legal
04:15
3.11 Further Attack Vectors
02:39
3.12 Countermeasures Across the Cloud
06:29
3.13 Virtualization Systems Controls
02:21
3.14 IAAA in the Cloud Infrastructure
03:45
3.15 Business Continuity and Disaster Recovery
02:19
3.16 BCDR Scenarios
05:22
3.17 The Business Impact Analysis (BIA)
02:52
3.18 Strategy Risks
03:36
3.19 Creating the BCP
03:18
3.20 Testing the Plan
02:14
3.21 Post-Incident Review
05:59
3.22 Physical and Environmental Controls
03:01
3.23 Data Center Operations
02:00
3.24 Domain 3 Review

Module 4: Cloud Application Security

04:23
4.1 Domain 4 Overview
04:56
4.2 Determining Data Sensitivity
01:48
4.3 Cloud Application Architecture
08:42
4.4 API's: Access, Request and Response
05:19
4.5 Types of API's
03:03
4.6 Common Pitfalls of Cloud Security Application Deployment
02:52
4.7 Multitenancy
03:32
4.8 Security Responsibilities Across Models
05:31
4.9 Software Development Lifecycle for the Cloud
00:42
4.10 Systems Development Lifecycle
05:53
4.11 Vulnerability Databases and Resources
04:58
4.12 OWASP Top 10
03:04
4.13 Normative Frameworks
02:03
4.14 Identity and Access Management: Steps to Access Control
07:25
4.15 Managing SSO in the Cloud
03:43
4.16 SSO with SAML
01:30
4.17 Open ID Connect
02:57
4.18 OAUTH 2.0
01:50
4.19 Threat Modeling
04:15
4.20 Threat Modeling: Use/Misuse Cases
03:30
4.21 Security Devices
02:08
4.22 Security Testing
02:41
4.23 Domain 4 Review

Module 5: Operations

01:53
5.1 Domain 5 Overview
07:08
5.2 Physical Design and Infrastructure
02:02
5.3 Secure Server Configuration Part 1
03:02
5.4 Secure Server Configuration Part 2
02:08
5.5 Clustered Hosts
01:28
5.6 Virtual Switches
02:19
5.7 Assessing the Physical Infrastructure of a CSP
03:10
5.8 Logical Security
03:04
5.9 Network Isolation Security Zones
03:32
5.10 Zone Architecture
00:57
5.11 VLANS
01:42
5.12 Securing Virtual Machines
05:00
5.13 Secure Network Configuration: DNS
04:53
5.14 Maintenance Part 1: Patch Management
02:00
5.15 Maintenance Part 2: Performance Monitoring Management Planning
01:25
5.16 Network Security Controls
02:31
5.17 IT Service Management (ITSM)
06:20
5.18 Operations Management
06:19
5.19 Risk Management
02:57
5.20 Risk Identification
04:27
5.21 Risk Analysis
05:47
5.22 Risk Mitigation
04:05
5.23 Risk Monitoring
02:39
5.24 Domain 5 Review

Module 6: Legal and Compliance

02:15
6.1 Domain 6 Overview
03:11
6.2 Liabilities: Who is at Fault?
03:33
6.3 Types of Laws
09:05
6.4 Intellectual Property
01:17
6.5 Framework and Guidelines
02:49
6.6 ISO 27018 CCSP
01:59
6.7 Generally Accepted Privacy Principles (GAPP)
01:02
6.8 APEC
02:09
6.9 European Data Protection Directive
00:44
6.10 PIPEDA
02:47
6.11 US Laws
03:07
6.12 ISO 27001 and 27002
04:04
6.13 E-Discovery and Forensics
05:47
6.14 Forensics
03:10
6.15 Volatility
01:44
6.16 Protecting the Integrity of Evidence
05:52
6.17 Audit
01:52
6.18 Domain 6 Review
04:39
6.19 The 6 Domains of CCSP: What Now?

Course Description

The CCSP certification allows you to showcase your cloud knowledge and improve your organization’s security posture. It can also help you obtain an increase in compensation and create better positioning for new job opportunities.

Prerequisites

While there are no prerequisites for this course, it assumes that you have basic knowledge in information security and cloud concepts.

Course Goals

By the end of this course, students should be able to:

  • Know what the CCSP certification exam is about
  • Understand all six CCSP domains
  • Be prepared for the CCSP exam

In our free Certified Cloud Security Professional (CCSP) course, you will obtain a complete understanding of security risks and mitigation strategies associated with data security in the cloud and become prepared to pass the CCSP certification exam.

What is CCSP?

CCSP is the acronym for Certified Cloud Security Professional. It is a fairly new certification, introduced in 2015 by the ISC2 and the Cloud Security Alliance (CSA), that was created due to the increased popularity of the cloud and the security risks that came along with it. The designation signifies that individuals who have earned it have a thorough understanding of the security associated with the cloud, but also with software, information and other cyber environments.

What Does the CCSP Online Training Course Entail?

Our free online Certified Cloud Security Professional training course will provide you with the knowledge and skills to protect your organization’s cloud environment. With more and more companies moving information to the cloud, it has become crucial to have experts in cloud computing. This course will allow you to become one of those experts.

This training covers all topics related to CCSP certification, preparing you to successfully pass the certification exam. Upon completion, you will have comprehensive knowledge to understand the security challenges that are common to different types of cloud services, to select and implement appropriate controls to ensure the security of cloud environments, and the ability to identify, evaluate, and mitigate risks to your organizations cloud environment. You will take an in-depth look at all six core domains of the CCSP common body of knowledge:

  • Architectural concepts and design requirements Cloud data security
  • Cloud platform and Infrastructure security
  • Cloud Application security
  • Operations
  • Legal and compliance

The total clock hours for this course is 9 hrs. 48 minutes. You will receive a Certificate of Completion when you are finished.

How Useful is CCSP Certification?

Obtaining your CCSP certification shows that you are a competent, knowledgeable, cloud security specialist who has hands-on experience in the field. Just by having the certification, you will be qualified for a number of job opportunities and a better salary.

Some of the common job titles for CCSP certified employees include:

  • Security Administrator
  • Security Manager
  • Security Architect
  • Security Engineer
  • Security Consultant
  • Systems Engineer
  • Systems Architect
  • Enterprise Architect

This, of course, isn’t an exhaustive list. The above job titles could potentially represent many different roles within an organization.

Becoming CCSP certified also means that you will likely be able to secure a higher salary than counterparts without certification. Exact salaries are hard to quote because the positions and organizations for CCSPs is so varied.

What Does a Certified Cloud Security Professional Do?

A major part of being a Certified Cloud Security Professional is identifying critical information and executing the measures that reduce or eliminate the risk of exploitation for organizations. Knowledge of cloud architecture is needed to run and manage it. Some of the responsibilities of a CCSP may include:

  • Building and implementing infrastructures for cloud environments
  • Operating and overseeing infrastructures for cloud environments
  • Managing physical infrastructures for cloud environments
  • Building and operating logical infrastructures for cloud environments
  • Ensuring compliance with regulation and controls
  • Conducting risk assessments of physical and logical infrastructures
  • Understanding how to acquire, collect and preserve digital evidence
  • Managing communication with and identifying relevant parties
  • Auditing and monitoring of tools, mechanisms, and facilities

What is Involved in the CCSP Certification Exam?

The CCSP certification exam is a four-hour exam with 125 multiple-choice questions. You must earn at least 700 out of 1,000 points to successfully pass. The exam covers the six CCSP domains, which are individually weighted as follows:

  • Architectural concepts and design requirements – 19%
  • Cloud data security – 20%
  • Cloud platform and Infrastructure security – 19%
  • Cloud Application security – 15%
  • Operations – 15%
  • Legal and compliance – 12%

You also must have the following to qualify for certification:

  • At least five years paid work experience in information technology
  • Three of the five years must consist of work in information security, and one year in one or more of the six domains (above)

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Certified Cloud Security Professional (CCSP) Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.

Verticals