CCSP (Certified Cloud Security Professional)

by Net Security Training Claim Listing

On this accelerated Certified Cloud Security Professional (CCSP) course you’ll get the cloud security skills you need to manage cloud environments and purchased cloud services.

£480

Contact the Institutes

Fill this form

Advertisement

Net Security Training Logo

img Duration

3 Hours

Course Details

On this accelerated Certified Cloud Security Professional (CCSP) course you’ll get the cloud security skills you need to manage cloud environments and purchased cloud services.

 

As well as learning how to keep your sensitive cloud data secure, you’ll also study:

  • Architectural concepts and design requirements

  • Cloud data security

  • Cloud platform & infrastructure security

  • Cloud application security

  • Compliance

  • Operations

 

Outdated approaches to cloud could be opening your organisation to crippling cyber-attacks. Businesses around the world need experienced professionals with advanced skills in cloud security.

Developed by leading information security organisations, the Cloud Security Alliance (CSA) and (ISC)2, this advanced certification proves your cloud security expertise at a global level.

All our trainers have extensive experience in delivering CCSP training events around the world. They are industry certified professionals who deliver our events with pride and passion. 

 

Course Objectives:

  • Learn strategies for protecting data at rest and in motion 

  • Identify and explain six phases of data lifecycle 

  • Learn strategies for classifying data, protecting data, management ensure privacy and monitoring agencies 

  • Able to ensure data, application integrity, and access management solutions 

  • Learn the concepts of lost files recovery and event management 

  • Identify privacy issues within a cloud environment for auditing controls and reporting attributes 

  • Learn techniques for regulatory frameworks, crime analysis and evidence gathering methods 

  • Identify types of controls, various level of integrity, confidentiality and availability for securing data 

  • Find out how to maintain business continuity and also prepare disaster recovery plans and techniques 

  • Learn to identify virtual and physical components to risk management analysis 

 

Course Syllabus:

Domain 1: Cloud Concepts, Architecture and Design

  • Understand Cloud Computing Concepts

  • Describe Cloud Reference Architecture

  • Understand Security Concepts Relevant to Cloud Computing

  • Understand Design Principles of Secure Cloud Computing

  • Evaluate Cloud Service Providers

 

Domain 2: Cloud Data Security

  • Describe Cloud Data Concepts

  • Design and Implement Cloud Data Storage Architectures

  • Design and Apply Data Security Technologies and Strategies

  • Implement Data Discovery

  • Implement Data Classification

  • Design and Implement Information Rights Management (IRM)

  • Plan and Implement Data Retention, Deletion and Archiving Policies

  • Design and Implement Auditability, Traceability and Accountability of Data Events

 

Domain 3: Cloud Platform and Infrastructure Security

  • Comprehend Cloud Infrastructure Components

  • Design a Secure Data Centre

  • Analyse Risks Associated with Cloud Infrastructure

  • Design and Plan Security Controls

  • Plan Disaster Recovery (DR) and Business Continuity (BC)

 

Domain 4: Cloud Application Security

  • Advocate Training and Awareness for Application Security

  • Describe the Secure Software Development Life Cycle (SDLC) Process

  • Apply the Secure Software Development Life Cycle (SDLC)

  • Apply Cloud Software Assurance and Validation

  • Use Verified Secure Software

  • Comprehend the Specifics of Cloud Application Architecture

  • Design Appropriate Identity and Access Management (IAM) Solutions

 

Domain 5: Cloud Security Operations

  • Implement and Build Physical and Logical Infrastructure for Cloud Environment

  • Operate Physical and Logical Infrastructure for Cloud Environment

  • Manage Physical and Logical Infrastructure for Cloud Environment

  • Implement Operational Controls and Standards (e.g., Information Technology Infrastructure Library (ITIL), International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 20000-1)

  • Support Digital Forensics

  • Manage Communication with Relevant Parties

  • Manage Security Operations

 

Domain 6: Legal, Risk and Compliance

  • Articulate Legal Requirements and Unique Risks within the Cloud Environment

  • Understand Privacy Issues

  • Understand Audit Process, Methodologies, and Required Adaptations for a  Cloud Environment

  • Understand Implications of Cloud to Enterprise Risk Management

  • Understand Outsourcing and Cloud Contract Design

  • London Branch

    33 Fitzroy Street,, London

Check out more CCSP (Cisco Certified Security Professional) courses in UK

BSI Training Academy Logo

EC-Council Certified Incident Handler

The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. You will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling.

by BSI Training Academy [Claim Listing ]
Hereford Sixth Form College Logo

Computer Games Development & Cyber Security

This course provides you with an opportunity to study in the field of Computer Science through the context of Games Development & Cyber Security.

by Hereford Sixth Form College [Claim Listing ]
London IT Training (LIT) Logo

Cyber Security Foundation & Practitioner (CSFP) Training

This certificate course is designed for the IT professionals who are in charge of managing, monitoring, and configuring the IT security issues of the organization. In this course, you will get a comprehensive understanding of the basics of Cyber Security,

by London IT Training (LIT)
EHS Global Tech Logo

Cyber Security Awareness

Cyber Security Awareness course is offered by EHS Global Tech. Extensive reporting functionality allows you to see how your employees are performing with their training. Add our games activities to your training to engage your employees.

by EHS Global Tech [Claim Listing ]
ID Cyber Solutions Logo

Certified Secure Computer User

The Certified Secure Computer User Course is aimed at end users in order to educate them about the main threats to their data’s security. It also equips the students with the basic knowledge that helps them to keep their devices and data secure in daily life

by ID Cyber Solutions [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy