BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
Official (ISC)²® Training Seminar for the Certified Cloud Security Professional (CCSP®) provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam. Content aligns with and comprehensively covers the six domains of the (ISC)² CCSP Common Body of Knowledge (CBK®), ensuring relevancy across all disciplines in the field of cloud security.
Official courseware is developed by (ISC)² – creator of the CCSP CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CCSP and have completed intensive training to teach (ISC)² content. At the completion of this course, participants will be able to:
- Understand legal frameworks and guidelines that affect cloud services.
- Recognize the fundamentals of data privacy regulatory/legislative mandates.
- Assess risks, vulnerability, threats and attacks in the cloud environment.
- Evaluate the design and plan for cloud infrastructure security controls.
- Evaluate what is necessary to manage security operations.
- Understand what operational controls and standards to implement.
- Describe the types of cloud deployment models in the types of “as a service” cloud models currently available today.
- Identify key terminology and associated definitions related to cloud technology. Be able to establish a common terminology for use within a team or workgroup.
- Build a business case for cloud adoption and be able to determine with business units the benefits of the cloud and cloud migration strategies.
This course will fully prepare you for the (ISC)2® CCSP® Certification exam.
Prerequisites: Before enrolling in the course, you should have at least five years of experience in information technology, of which 3 years were in information security and one year in one or more of the six domains of the CCSP CBK.
Schedule
CCSP (Certified Cloud Security Professional)
date
location
price
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Program Level
Advanced
Training Delivery Methods
Group Live
Duration
5 Days / 32 hours Training
CPE credits
26 NASBA CPE Credits
Field of Study
Information Technology
Advanced Prep
N/A
Course Registration
Candidates can choose to register for the course by via any of the below methods:
- Email: Sales@phoenixts.com
- Phone: 301-582-8200
- Website: www.phoenixts.com
Upon registration completion candidates are sent an automated course registration email that includes attachments with specific information on the class and location as well as pre-course study and test preparation material approved by the course vendor. The text of the email contains a registration confirmation as well as the location, date, time and contact person of the class.
Online enrolment closes three days before course start date.
On the first day of class, candidates are provided with instructions to register with the exam provider before the exam date.
Complaint Resolution Policy
To view our complete Complaint Resolution Policy policy please click here: Complaint Resolution Policy
Refunds and Cancellations
To view our complete Refund and Cancellation policy please click here: Refund and Cancellation Policy
Course Outline
Chapter 1: Cloud Concepts, Architecture and Design
- State the essential characteristics of cloud computing
- Describe the fundamental cloud computing services
- Describe the cloud computing reference architectures
- Explain cloud computing activities
- Compare cloud service capabilities and models
- Describe cloud deployment models
- Summarize economic characteristics of cloud computing
- Evaluate cloud computing ROI and KPI metrics
- Summarize cloud computing security concepts
- Describe key security considerations for each service model
- Analyze key cloud service provider contractual relationship documents
Chapter 2: Cloud Governance: Legal, Risk and Compliance
- Explain the issues with international conflict of law
- Interpret guidelines for digital forensics
- Identify the fundamentals of data privacy regulatory/legislative mandates
- Summarize audit process, methodologies and cloud-ready adaptations
- Describe risk management related to cloud services
- Identify due care/diligence activities related to service contracts
Chapter 3: Cloud Data Security
- Discuss cloud data security concepts
- Describe cryptography
- Explain data discovery and classification technologies
- Interpret cloud data storage architectures
- Analyze information rights management
- Assess cloud data security strategies
- Compare solutions for cloud data retention, deletion and archival policies
- Explain basic security concepts in the cloud
Chapter 4: Cloud Platform and Infrastructure Security
- Compare cloud infrastructure components
- Select standard practices for implementing a secure data center design
- Assess risks, vulnerability, threats and attacks in the cloud environment
- Discover components for planning and implementing security controls
- Evaluate the design and plan for cloud infrastructure security controls
- Appraise appropriate identity and access management (IAM) solutions
- Recommend business continuity and disaster recovery (BCDR) standards
Chapter 5: Cloud Application Security
- Explain training and awareness solutions for application security
- Assess challenges in the secure software development life cycle (SDLC) process
- Select a threat model for securing software development
- Demonstrate cloud software assurance and validation
- Choose verified secure software
- Explain the specifics of a cloud application architecture
Chapter 6: Cloud Security Operations
- Analyze what is used to manage and operate physical and logical infrastructure of a cloud environment
- Discuss operational controls and standards
- Identify methodologies for supporting digital forensics
- Identify critical communication needs with relevant parties
- Define auditability, traceability and accountability of security-relevant data events
- Select requirements to implement secure operations
CCSP Certification Exam Information
CCSP Domains:
- Domain 1. Cloud Concepts, Architecture and Design
- Domain 2. Cloud Governance: Legal, Risk and Compliance
- Domain 3. Cloud Data Security
- Domain 4. Cloud Platform and Infrastructure Security
- Domain 5. Cloud Application Security
- Domain 6. Cloud Security Operations
CCSP Certification Exam Details:
Number of Questions: 125
Format: Multiple choice
Passing grade: 700 out of 1000 points
Length of test: 4 hours
Finance your CCSP Training!
We have partnered with Meritize to provide our students with financing options to fund your education.Click here to apply Check your loan options in minutes without impacting your credit score.
CCSP Certification Training FAQs
According to payscale.com, professionals with their CCSP certification earn on average $119,000 per year.
The CCSP certification was created in to address challenges and issues that enterprises find themselves facing with cloud computing. We expanded on this question on our blog post, What is the CCSP Certification?
“Overall, highly satisfied with the facility, course, and instructor. I would say that the CCSP requires more than just a week of instruction due to breadth of material that must be covered.” -Student from January 2019
“Outstanding Instructor. Very knowledgeable about the subject area. I’ve learned a lot over this time period.” – Student from July 2019
CCSP Certification Training Resources
-
Blog Post
OffSec and Phoenix TS Forge Strategic Partnership to Elevate Cybersecurity Training Landscape
-
Blog Post
PHOENIX TS NOW OFFERS EMERGING TECH TRAINING AS AN AUTHORIZED TRAINING PARTNER WITH CERTNEXUS
-
Blog Post
Phoenix TS and Alliance Cyber Announce Strategic Partnership to Deliver Comprehensive Training Services Nationwide
-
Blog Post
Phoenix TS Took To San Diego For CIC 2023: Highlights From The Conference And What Comes Next
-
Blog Post
Cybersecurity Mindful Moments by Tara Lemieux
-
Blog Post
CompTIA and Continuing Education (CE’s)
-
Blog Post
Boost your Cyber Security Awareness
-
Blog Post
Why You Should Invest in Cyber Security
-
Blog Post
Diversity: A Tough Topic Worth Tackling
-
Blog Post
Benefits and Advantages of Instructor-Led Courseware
-
Blog Post
Data, Data, and more Data!!!
-
Blog Post
Be Prepared for Anything with EDRP
-
Blog Post
Learn How to Make Your Dream Business a Reality
-
Blog Post
The FYI ABOUT PMP from PMI
-
Blog Post
STRENGTHEN YOUR CYBERCORE!
-
Blog Post
Security + Changes!
-
Blog Post
What’s the 411 with the updated CySA+?
-
Blog Post
How to Maintain Team Building While Working Remotely!
-
Blog Post
All About the CISSP
-
Blog Post
Get CCNA-ready in 2020!
-
Blog Post
IT Project Managers, a career of keeping business IT on track!
-
Blog Post
Jira – The Godzilla of Team Support Tools!
-
Blog Post
What’s All the Buzz Around Microsoft Azure?
-
Blog Post
Get the E-Book!
-
Blog Post
The Adobe Connect Way!
-
Blog Post
Train, Test and Certify From Home!
-
Blog Post
Critical Thinking in the Workplace
-
Blog Post
Are you Teleworking Now? Watch out. Cybersecurity risks are everywhere!
-
Blog Post
Everything you wanted to know about the Security+ SY0-601 but were afraid to ask!
-
Blog Post
Hey Remote Worker! You Better be Using Email Best Practices
-
Blog Post
Head in the Cloud? Time to Face Cyber Security Reality
-
Blog Post
Companies use COVID-19 Downtime to Educate their Workforce Online
-
Resource
(ISC)² CCSP Assessment
-
Blog Post
What is CCSP Certification?
-
Blog Post
Average CCSP Salary for 2017
-
Blog Post
Cloud Security Questions and Considerations to Ask the Cloud Service Provider
-
Blog Post
Cloud Security Best Practices: Vulnerability Scanning
-
Blog Post
7 Cloud Security Best Practices
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org