null
NextTech
  • All Courses
  • Applications
    • Adobe
    • Microsoft 365
    • Microsoft Apps for Business
    • Windows 10
  • Information Technology
    • AI & Machine Learning
    • Apps, Infrastructure, & Networking
    • Big Data
    • Business Applications
    • Cloud Computing
    • Data Centre
    • DevOps
    • SAP
    • Security
    • Software Development
  • Process Management
    • Agile
    • APMG
    • Business Analysis
    • IT Services
    • MSP
    • PRINCE2
    • Project Management
    • Quality
    • RESILIA
    • Software Testing
  • Professional Development
    • Business Communication
    • Sales
    • Business Skills
    • Customer Service
    • Digital Marketing
    • Learning and Development
    • Management and Leadership
    • Performance Enhancement
  • Contact Us
    • Online Evaluations
    • Training Guide
    • Google Review
  • Blog
  • Request a Quote
  • Sign in
  • Register
  • Australian Dollars
  • Request a Quote
Vertical Categories
NextTech
0
NextTech
  • Hello, sign in My Account
    • Sign in
    • Register
  • My Cart

    0 items $0
All Courses
  • Applications
    • Adobe
    • Microsoft 365
    • Microsoft Apps for Business
    • Windows 10
  • Information Technology
    • AI & Machine Learning
    • Apps, Infrastructure, & Networking
    • Big Data
    • Business Applications
    • Cloud Computing
    • Data Centre
    • DevOps
    • SAP
    • Security
    • Software Development
  • Process Management
    • Agile
    • APMG
    • Business Analysis
    • IT Services
    • MSP
    • PRINCE2
    • Project Management
    • Quality
    • RESILIA
    • Software Testing
  • Professional Development
    • Business Communication
    • Sales
    • Business Skills
    • Customer Service
    • Digital Marketing
    • Learning and Development
    • Management and Leadership
    • Performance Enhancement
  • Home
  • Contact Us
    • Online Evaluations
    • Training Guide
    • Google Review
  • Blog
  • Request a Quote

CCSP Certification Training Course

This Certified Cloud Security Professional (CCSP) training course is the leading certification by ISC. This course will enable you to negate security threats to your cloud storage by understanding information security risks and implementing...
MSRP:
Was:
Now: $2,941
(You save )
Brand
NextTech eLearning
SKU:
CCSP
Duration:
3 Months
Delivery:
eLearning
Course Date :

Adding to cart… The item has been added
Request a Quote
Share this course
  • Facebook
  • Email
  • Print
  • Twitter
  • Linkedin
  • Pinterest
  • Home
  • All Courses
  • CCSP Certification Training Course

CCSP Certification

This Certified Cloud Security Professional (CCSP) training course is the leading certification by ISC. This course will enable you to negate security threats to your cloud storage by understanding information security risks and implementing strategies to maintain data security.

  • Course Overview
  • Course Content
  • Exam & Certification
  • FAQs

About the course

Gain expertise in cloud security architecture, design, applications, and operations with this CCSP online training certification course. You will receive step-by-step guidance and an easy-to-follow, detailed lesson plan regarding every facet of CCSP, helping you accelerate your career in the growing field of cloud security.

Eligibility

This online CCSP certification course is ideal for anyone wishing to learn and explore career opportunities in IT network security and cloud computing. This course also is ideal for enterprise architects, security administrators, systems engineers, security architects, security consultants, security engineers, security managers, and system architects.

Pre-requisites

To obtain the CCSP certification course, you must have:
At least five years of working experience in IT, including three years of information security and one year of cloud security experience
Those without the required experience can take the exam to become an Associate of ISC while working toward the experience needed for full certification

Skills Covered

  • Cloud computing concepts
  • Cloud architecture and design
  • Cloud infrastructure security
  • Cloud data lifecycle
  • Cloud application security
  • Vulnerabilities and risk
  • Threat modeling
  • Encryption
  • Identity and access management
  • Cloud security operations
  • Risk management and analysis
  • Disaster recovery
  • Business continuity

Course Content

Certified Cloud Security Professional (CCSP®)

  • Lesson 0 - Course Introduction
    • 0.1 CCSP Certification Overview
    • 0.2 Course Objectives
  • Lesson 1 - Cloud Concepts, Architecture, and Design
    • 1.01 Cloud Concepts, Architecture, and Design
    • 1.02 Security Concepts
    • 1.03 Key Security Concepts, Defense in Depth, Due Care, and Due Dilligence
    • 1.04 Security Controls and Functionalities
    • 1.05 Cloud Computing Concepts
    • 1.06 Business Drivers
    • 1.07 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
    • 1.08 Cloud Computing Concepts Advantages
    • 1.09 Cloud Reference Architecture
    • 1.10 Cloud Computing Roles and Actors
    • 1.11 Cloud Service Categories Infrastructure as a Service (IaaS)
    • 1.12 Cloud Service Categories Platform as a Service (PaaS)
    • 1.13 Cloud Service Categories Software as a Service (SaaS)
    • 1.14 Cloud Service Categories Management
    • 1.15 Cloud Deployment Models: Public Cloud
    • 1.16 Cloud Deployment Models: Private Cloud
    • 1.17 Cloud Deployment Models: Hybrid Cloud
    • 1.18 Cloud Deployment Models: Community Cloud
    • 1.19 Models and Characteristics
    • 1.20 Comparison of Cloud Deployment Models
    • 1.21 Case Study: Hybrid Cloud
    • 1.22 Cloud Technology Roadmap
    • 1.23 Impact of Related Technologies
    • 1.24 Cryptography
    • 1.25 Key Management
    • 1.26 IAM and Access Control
    • 1.27 Data Remanence
    • 1.28 Virtualization
    • 1.29 Common Threats
    • 1.30 Design Principles of Secure Cloud Computing
    • 1.31 Cost-Benefit Analysis
    • 1.32 Evaluate Cloud Service Providers
    • 1.33 SOC
    • 1.34 IT Security Evaluation
    • 1.35 FIPS
    • 1.36 Scenario
    • 1.37 Key Takeaways
    • Knowledge Check
  • Lesson 2 - Cloud Data Security
    • 2.01 Cloud Data Security
    • 2.02 Cloud Data Life Cycle
    • 2.03 Cloud Data Life Cycle: Create, Store, Use, and Share
    • 2.04 Real-World Scenario
    • 2.05 Cloud Data Life Cycle: Archive
    • 2.06 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
    • 2.07 Cloud Data Storage Architectures
    • 2.08 Cloud Data Storage Architectures: Storage Types for IaaS
    • 2.09 Cloud Data Storage Architectures: Storage Types for PaaS
    • 2.10 Cloud Data Storage Architectures: Storage Types for SaaS
    • 2.11 Cloud Data Storage Architectures: Threats to Storage Types
    • 2.12 Real-World Scenario
    • 2.13 Data Security Strategies
    • 2.14 Data Security Strategies: Encryption (Use Cases)
    • 2.15 Data Security Strategies: Encryption Challenges
    • 2.16 Data Security Strategies: Encryption in IaaS
    • 2.17 Data Security Strategies: Database Encryption
    • 2.18 Data Security Strategies: Key Management
    • 2.19 Data Security Strategies: Key Storage in the Cloud
    • 2.20 Data Security Strategies: Masking
    • 2.21 Data Security Strategies: Data Anonymization
    • 2.22 Data Security Strategies: Tokenization
    • 2.23 Data Security Strategies: Homomorphic Encryption and Bit Splitting
    • 2.24 Real-World Scenario
    • 2.25 Data Security Strategies: Data Loss Prevention
    • 2.26 Scenario
    • 2.27 Data Discovery and Classification Technology
    • 2.28 Data Discovery and Classification Technology: Data Classification
    • 2.29 Data Discovery and Classification Technology: Challenges With Cloud Data
    • 2.30 Jurisdictional Data Protections for Personally Identifiable Information (PII)
    • 2.31 Privacy Acts: GDPR
    • 2.32 Privacy Acts: GDPR Data Protection Principles
    • 2.33 Privacy Acts: United States
    • 2.34 Privacy Acts: HIPAA, FISMA, and SOX
    • 2.35 Jurisdictional Data Protections for PII: Responsibilites of Cloud Services
    • 2.36 Data Rights Management
    • 2.37 Data Retention, Deletion, and Archiving Policies
    • 2.38 Data Retention
    • 2.39 Data Deletion
    • 2.40 Real-World Scenario
    • 2.41 Data Archiving
    • 2.42 Real-World Scenario
    • 2.43 Legal Hold
    • 2.44 Auditability, Traceability, and Accountability of Data Events
    • 2.45 SIEM
    • 2.46 Chain of Custody
    • 2.47 Nonrepudation
    • 2.48 Real-World Scenario
    • 2.49 Key Takeaways
    • Knowledge Check
  • Lesson 3 - Cloud Platform and Infrastructure Security
    • 3.01 Cloud Platform and Infrastructure Security
    • 3.02 Cloud Infrastructure Components
    • 3.03 Network and Communications
    • 3.04 Management Plane and Virtualization
    • 3.05 Factors That Impact Data Center Design
    • 3.06 Physical Design: Buy or Build
    • 3.07 Physical Design: Data Center Design Standards
    • 3.08 Physical Design: Uptime Institute
    • 3.09 Physical Design: Tiers
    • 3.10 Physical Design Features of Tiers
    • 3.11 Real-World Scenario
    • 3.12 Environmental Design Considerations
    • 3.13 Connectivity
    • 3.14 Hypervisor and Resource Allocation
    • 3.15 Risks Associated with Cloud Infrastructure
    • 3.16 Policy General and Virtualization Risks
    • 3.17 Cloud-Specific Legal and Non-Cloud Specific Risks
    • 3.18 Cloud Attack Vectors and Compensating Controls
    • 3.19 Business Scenario
    • 3.20 Design and Plan Security Controls
    • 3.21 Real-World Scenario
    • 3.22 Plan Disaster Recovery and Business Continuity
    • 3.23 Real-World Scenario
    • 3.24 BCDR Planning Factors and Disruptive Events
    • 3.25 Characteristics of Cloud Infrastructure
    • 3.26 BCDR strategies and Returning to Normal
    • 3.27 Real-World Scenario
    • 3.28 BCDR Creation
    • 3.29 BCDR Creation: Test
    • 3.30 Business Requirements
    • 3.31 BCDR Creation: Report and Revise
    • 3.32 Testing Types, Uptime, Availability, Activity, and Case Study
    • 3.33 Security Training and Awareness
    • 3.34 Real-World Scenario
    • 3.35 Key Takeaways
    • Knowledge Check
  • Lesson 4 - Cloud Application Security
    • 4.01 Cloud Application Security
    • 4.02 Advocate Training and Awareness for Application Security
    • 4.03 Real-World Scenario
    • 4.04 Common Pitfalls
    • 4.05 Encryption Dependency Awareness
    • 4.06 Business Scenario
    • 4.07 Understanding Software Development Lifecycle Process
    • 4.08 Real-World Scenario
    • 4.09 Vulnerabilities and Risks
    • 4.10 Threat Modeling
    • 4.11 Real-World Scenario
    • 4.12 Encryption
    • 4.13 Sandboxing and Application Virtualization
    • 4.14 Federated Identity Management
    • 4.15 SAML Authentication
    • 4.16 Identity and Access Management
    • 4.17 Multi-Factor Authentication
    • 4.18 Real-World Scenario
    • 4.19 Cloud Access Security Broker
    • 4.20 Application Security Testing
    • 4.21 Software Supply Chain Management
    • 4.22 Real-World Scenario
    • 4.23 Key Takeaways
    • Knowledge Check
  • Lesson 5 - Cloud Security Operations
    • 5.01 Cloud Security Operations
    • 5.02 Secure Configuration of Hardware: Servers
    • 5.03 Secure Configuration of Hardware: Storage Controllers
    • 5.04 Real-World Scenario
    • 5.05 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription
    • 5.06 Secure Configuration of Hardware: Virtual Switches
    • 5.07 Configuration of VM Tools
    • 5.08 Configuration of VM Tools Running a Physical Infrastructure: Legal, Compatibility, Control, and Log Data
    • 5.09 Configuration of VM Tools Running a Physical Infrastructure: PCI DSS Access, Upgrades and Changes, and Failover Technology
    • 5.10 Configuration of VM Tools Running a Physical Infrastructure: Compliance, Regulations, and Outsourcing
    • 5.11 Configuration of VM Tools Running a Physical Infrastructure: Placement of Security, Virtualization, VM
    • 5.12 Real-World Scenario
    • 5.13 Securing Network Configuration
    • 5.14 Real-World Scenario
    • 5.15 Clustered Hosts
    • 5.16 Dynamic Optimization and Clustered Storage
    • 5.17 Maintenance Mode and Patch Management
    • 5.18 Performance Monitoring
    • 5.19 Real-World Scenario
    • 5.20 Network Security Controls: Layered Security and Honeypots
    • 5.21 Network Security Controls: SIEM
    • 5.22 Log Management
    • 5.23 Orchestration
    • 5.24 Availability of Guest OS
    • 5.25 Operations Management: Part One
    • 5.26 Real-World Scenario
    • 5.27 Operations Management: Part Two
    • 5.28 Risk Management Process: Framing Risk and Risk Assessment
    • 5.29 Quantitative Risk Analysis
    • 5.30 Scenario
    • 5.31 Risk Response and Risk Monitoring
    • 5.32 Collection and Preservation of Digital Evidence
    • 5.33 Communication with Relevant Parties
    • 5.34 Real-World Scenario
    • 5.35 Security Operations Center
    • 5.36 Key Takeaways
    • Knowledge Check
  • Lesson 6 - Legal Risk and Compliance
    • 6.01 Legal, Risk, and Compliance
    • 6.02 Case Study
    • 6.03 Legislative Concepts
    • 6.04 Intellectual Property Laws
    • 6.05 Case Study
    • 6.06 Business Scenario
    • 6.07 Acts and Agreements
    • 6.08 Case Study
    • 6.09 NERC
    • 6.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP)
    • 6.11 Jurisdictional Differences in Data Privacy
    • 6.12 Terminologies and eDiscovery
    • 6.13 Forensic Requirements and PII
    • 6.14 Gap Analysis, SOC Reports, and Chain of Custody
    • 6.15 Vendor Management
    • 6.16 Cloud Computing Policies and Risk Attitude
    • 6.17 SLA
    • 6.18 Quality of Service
    • 6.19 Risk Mitigation
    • 6.20 Risk Management Metrics and ISO Standard
    • 6.21 Real-World Scenario
    • 6.22 Key Takeaways
    • Knowledge Check

What do I need to do to unlock my Certification?

To unlock your certificate, you must complete 85 percent of the self-paced learning and successfully pass the course end assessment with a score of 70 percent or above.

FAQs

  • What is CCSP?

    CCSP is an acronym that stands for; Certified Cloud Security Professional. This certification validates your advanced skills and knowledge in the ability to design, manage, and safeguard data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the Cyber Security experts at ISC.

  • What are the benefits of becoming a CCSP?

    Benefits of being CCSP-Certified are:

    • Increases career visibility and credibility
    • The certification creates job security and new job opportunities
    • Allows you to gain versatile vendor-neutral skills that can be applied to different technologies and methodologies
    • Gain access to a global community of like-minded cybersecurity leaders
    • Be better prepared to stem cyber attacks and inspire a safe and secure cyber world
    • On average, ISC members report earning 35% more than non-members
  • How do I enrol in this online training?

    You can enrol in this training on our website and make an online payment using any of the following option

    • Visa Credit or Debit Card
    • MasterCard
    • American Express
    • Diners Club
    • PayPal

    Once payment is received, you will automatically receive a payment receipt and access information via email.

Buy Now

Our Most Popular Training Courses

PI3

Angular Certification Training Course

MSRP:
Was:
Now: $824

NextTech eLearning

  • Duration 6 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
Angular Certification Training Course 6 Months
MSRP:
Was:
Now: $824
course info
security

CISA Certification Training Course

MSRP:
Was:
Now: $2,943

NextTech eLearning

  • Duration 3 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
CISA Certification Training Course 3 Months
MSRP:
Was:
Now: $2,943
course info
PI4

Java Certification Training Course

MSRP:
Was:
Now: $941

NextTech eLearning

  • Duration 6 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
Java Certification Training Course 6 Months
MSRP:
Was:
Now: $941
course info
PI1

CBAP® Certification Training Course

MSRP:
Was:
Now: $823

NextTech eLearning

  • Duration 3 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
CBAP® Certification Training Course 3 Months
MSRP:
Was:
Now: $823
course info
PD1

MongoDB Certification Training Course

MSRP:
Was:
Now: $1,238

NextTech eLearning

  • Duration 3 Months
View Course
Everything you need to become a PRINCE2 Practitioner, all in one place.
Course Name Exam Access/Duration Price (Incl Tax)  
MongoDB Certification Training Course 3 Months
MSRP:
Was:
Now: $1,238
course info
NextTech
Address :
Level 9 123 Pitt Street
Sydney - NSW - 2000
1300 263 559

Information

  • Contact Us
  • Blog
  • Sitemap

Brands

  • Microsoft
  • VMware
  • NextTech eLearning
  • SAP
  • AXELOS
  • View All

All Courses

  • Applications
  • Information Technology
  • Process Management
  • Professional Development
  • View All

Sign Up For Newsletter

Get the latest updates on new products and upcoming sales

PRINCE2®, PRINCE2 Agile®, MSP®, P3O®, M_o_R®, MoV®, MoP® and ITIL® are registered trademarks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. CAPM is a registered mark of the Project Management Institute, Inc. PMP is a registered mark of the Project Management Institute, Inc. PMI is a registered mark of the Project Management Institute, Inc. The PMI Registered Education Provider logo is a registered mark of the Project Management Institute, Inc. PMBOK is a registered mark of the Project Management Institute, Inc. PMI Program Management Professional (PgMP)® is a registered mark of Project Management Institute, Inc. PMI Agile Certified Practitioner (PMI-ACP)® is a registered mark of Project Management Institute, Inc.
© 2023 NextTech. Site by Andmine Digital Agency Melbourne Digital Agency Melbourne - AndMine