The ISC2 Certified Cloud Security Professional CCSP Training Course is designed for security professionals seeking to enhance their knowledge of cloud security. The program covers various aspects of data security, cloud infrastructure security, and information security. Through this training, participants will learn how to secure data centers, cloud environments, and cloud-based data access. The focus will be on cloud security solutions and techniques for detecting and responding to security incidents.
The training covers cloud computing technologies, including Microsoft Azure, as well as security practices related to physical infrastructure, cloud resource access control, and protection of sensitive data. Load balancers, security operations centers (SOCs), and cloud environment security will also be covered. Upon completion of the training, participants can attempt the CCSP exam, and earn the CCSP certification after passing the exam, which is a recognized industry standard for cloud security expertise.
Passing the CCSP Certification Exam meets U.S. DoD Directive 8140/8570.01 Technical (IAT) Level-III, and Information Assurance Security Architect/Engineer (IASAE) Level-III.
CCSP Training Delivery Methods
CCSP Training Information
In this CCSP course, you will learn how to:
- Define Cloud Concepts, Architecture, and Design
- Implement Cloud Data Security
- Understand Cloud Platform and Infrastructure Security
- Secure Cloud Applications
- Operationalize Cloud Security
- Understand Legal, Risk, and Compliance
- Continue learning and face new challenges with after-course one-on-one instructor coaching
CCSP Training Prerequisites
- Five years of cumulative, full-time working experience in IT (Information Technology) (three must be in information security, and one must be in one of the six CCSP CBK domains).
- Those without the required experience can take the exam to become an Associate of ISC2; while working toward the experience needed for full certification.
CCSP Certification Information
As one of only 12 ISC2 CPE Submitters worldwide, Learning Tree can submit courses on your behalf to ISC2 for CPE credit. (ISC)² members can earn:
- Group A credits for attending any of our cybersecurity courses, and
- Group B General Education credits for attending any other Learning Tree course.
This is an ISC2 certification prep course. Click here to view more ISC2 certification prep training.
CCSP Training Outline
1.1 Understand cloud computing concepts
1.2 Describe cloud reference architecture
1.3 Understand security concepts relevant to cloud computing
1.4 Understand design principles of secure cloud computing
1.5 Evaluate cloud service providers
2.1 Describe cloud data concepts
2.2 Design and implement cloud data storage architectures
2.3 Design and apply data security technologies and strategies
2.4 Implement data discovery
2.5 Plan and implement data classification
2.6 Design and implement Information Rights Management (IRM)
2.7 Plan and implement data retention, deletion, and archiving policies
2.8 Design and implement auditability, traceability, and accountability of data events
3.1 Comprehend cloud infrastructure and platform components
3.2 Design a secure data center
3.3 Analyze risks associated with cloud infrastructure and platforms
3.4 Plan and implementation of security controls
3.5 Plan business continuity (BC) and disaster recovery (DR)
4.1 Advocate training and awareness for application security
4.2 Describe the Secure Software Development Life Cycle (SDLC) process
4.3 Apply the Secure Software Development Life Cycle (SDLC)
4.4 Apply cloud software assurance and validation
4.5 Use verified secure software
4.6 Comprehend the specifics of cloud application architecture
4.7 Design an appropriate identity and access management (IAM) solution
5.1 Build and implement physical and logical infrastructure for the cloud environment
5.2 Operate and maintain physical and logical infrastructure for cloud environment
5.3 Implement operational controls and standards
5.4 Support digital forensics
5.5 Manage communication with relevant parties
5.6 Manage security operations
6.1 Articulate legal requirements and unique risks within the cloud environment
6.2 Understand privacy issues
6.3 Understand audit process, methodologies, and required adaptations for a cloud environment
6.4 Understand implications of cloud to enterprise risk management
6.5 Understand outsourcing and cloud contract design