This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK).
This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK).
You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud.
You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments.
You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. This five-day program is comprised of a total of six domains and includes:
Official (ISC)2 CCSP Training Handbook
Official (ISC)2 CCSP Flash Cards
CCSP Certification Exam Voucher
Prerequisites
Before taking this course, students should be experienced information security professionals with at least five years of IT experience, including three years of information security and at least one year of cloud security experience. Students should also have taken the CISSP Certification Prep Course (PT20532).
Audience
This course is designed for anyone whose position requires CCSP certification and for individuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services.
Course Topics
Architecture Concepts and Design Requirements
Cloud Data Security
Cloud Platform and Infrastructure Security
Cloud Application Security
Operations
Legal and Compliance
ProTech Training offers thousands of different courses in topics ranging literally from A-to-Z. From A+ certification to z/OS Mainframe systems, we have it all. ProTech is an elite Tier1 Managed Microsoft Partner for Learning Services and partnered with such leading firms as IBM, Broadcom, HP, Apple, Cisco, Citrix and more.
Our curriculum is also endorsed by both the Project Management Institute, the International Institute for Business Analysis, and aligned with the ScrumAlliance, SAFe and Scrum.org certifications.
For over thirty years ProTech has trained hundreds of thousands of students worldwide, having worked with over 60% of the Fortune 1000. Our curriculum includes hands-on workshops for all types of Enterprise IT professionals from Developers to Sys Admins, Data Scientists to Project Managers across a broad catalog of technology and business courses.
ProTech Consulting offerings general IT placement, staffing services and a specialized consulting practice focused on Enterprise Systems Management & Data Center Automation for very large data centers. We help customers with very complex and heterogenous IT networks keep their systems running smoothly and performing at peak capacity.
Through our consulting practice our experts have developed several innovative software products to help clients maintain and automate their IT systems.
The NASSCOM aligned Cyber Security Training program will equip you with the full range of skills needed to become an expert in this rapidly growing domain.
Do you love making networks work? The Network Architecture and Security Analytics (NASA) program at Sault College is designed to build on your already-amazing computer skills and deepen your knowledge in the design, operation, analysis, and security of enterprise networks.
As people continue relying on the internet and technology for work, entertainment, socializing, and completing day-to-day tasks, the need for cybersecurity analysts grows more eminent.
This course is designed to provide users with the knowledge and skills needed to effectively manage and implement security policies, procedures, and best practices for their companies.
In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology. Also, learn how to use that technology safely and securely.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy