Course Description

Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. The CCSP credential is designed for experienced information security professionals with at least five years of full-time IT experience, including three years of information security and at least one year of cloud security experience.

Led by an (ISC)² authorized instructor, this 5 day classroom based training seminar provides a comprehensive review of cloud security concepts and industry best practices, covering the 6 domains of the CCSP CBK:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories. 

What's Included

The 5-day official (ISC)² CCSP seminar includes:
  •  Five, 8-hour sessions
  •  An overview of the scope of the information of cloud security concepts and industry best practicesOfficial (ISC)² courseware
  • Taught by an authorized (ISC)² instructor
  • Student handbook
  • Collaboration with classmates
  • Real-world learning activities and scenarios

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

Course Content

After completing this workshop, participants will be able to:

  • Describe the building blocks necessary to develop cloud based systems, including concepts with regard to customer, provider, partner, measured services, scalability, virtualization, storage, and networking. Students will also be able to understand the cloud reference architecture based on activities defined by industry standard documents.
  • Identify the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will gain knowledge on topics of data discovery and classification techniques, digital rights management, privacy of data, data retention, deletion, and archiving, data event logging, chain of custody and non-repudiation, and the strategic use of security information and event management.
  • Identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. In addition to risk analysis, you will gain an understanding in how to prepare and maintain business continuity and disaster recovery plans, including techniques and concepts for identifying critical systems and lost data recovery.
  • Demonstrate an understanding of the Software Development Life Cycle, you will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments with regard to program interfaces, cloud application architecture, and how to ensure data and application integrity, confidentiality, and availability through identity and access management solutions.
  • Demonstrate an ability to develop, plan, implement, run, and manage the physical and logical cloud infrastructure though an understanding of the necessary controls and resources, best practices in monitoring and auditing, and the importance of risk assessment in both the physical and logical cloud infrastructures.
  • Identify privacy issues and audit processes utilized within a cloud environment, including, auditing controls, assurance issues, and the specific reporting attributes. Topics covered include, ethical behavior and required compliance within regulatory frameworks, which includes investigative techniques for crime analysis and evidence gathering methods.

Intended Audience

The course is designed for experienced information security professionals with at least five years of full-time IT experience, including three years of information security and at least one year of cloud security experience. The CCSP credential can be appropriate for mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security, governance, risk and compliance, and even IT auditing. The Official (ISC)² CCSP CBK Training Seminar builds on and brings together the holistic view of the topics covered in the everyday environment of an information assurance professional.

CCSP is most appropriate for those whose day-to-day responsibilities involve procuring, securing and managing cloud environments or purchased cloud services. 

Example job functions include, but are not limited to:

CCSP Who Needs

Prerequisites

The course is designed for experienced information security professionals with at least five years of full-time IT experience, including three years of information security and at least one year of cloud security experience.

Available Times & Locations

Location Date Pricing
Melbourne 12th February 2018 Course Price: $3,706.00
Early Bird Price: $3,432.00
Member Price: $3,150.10
12 slots available
Sydney 21st May 2018 Course Price: $3,706.00
Early Bird Price: $3,432.00
Member Price: $3,150.10
15 slots available