Call Now

+92 312 0490601

Certified Cloud Security Professional (CCSP)

Course Outline

Module 01: Cloud Concepts, Architecture & Design

Understanding cloud computing concepts
  • Cloud computing definitions
  • Cloud computing roles and responsibilities
  • Key cloud computing characteristics
  • Building block technologies

 

Describe cloud computing architecture
  • Cloud computing activities
  • Cloud service capabilities
  • Cloud service categories
  • Cloud deployment models
  • Cloud shared considerations
  • Impact of related technologies

 

Understanding security concepts relevant to cloud computing
  • Cryptography and key management
  • Identity and access control
  • Data and media sanitization
  • Network security
  • Virtualization security
  • Common threats
  • Security hygiene

 

Understanding design principles of secure cloud computing
  • Cloud secure data lifecycle
  • Cloud-based business continuity (BC) and disaster recovery (DR) plan
  • Business impact analysis (BIA)
  • Functional security requirements
  • Security considerations and responsibilities for different cloud categories
  • Cloud design patterns
  • DevOps security

 

Evaluate cloud services providers
  • Verification against criteria
  • System/subsystem product certifications

 

Module 02: Cloud Data Security

Describe cloud data concepts
  • Cloud data life cycle phases
  • Data dispersion
  • Data flows

 

Design & implement cloud data storage architectures
  • Storage types
  • Threats to storage types

 

Design & apply data security technologies & strategies
  • Encryption and key management
  • Hashing
  • Data obfuscation
  • Tokenization
  • Data loss prevention (DLP)
  • Keys, secrets and certificates management

 

Implement data discovery
  • Structured data
  • Unstructured data
  • Semi-structured data
  • Data location

 

Plan & implement data classification
  • Data classification policies
  • Data mapping
  • Data labeling

 

Design & implement information rights management (IRM)
  • Objectives
  • Appropriate tools

 

Plan & implement data retention, deletion & archiving policies
  • Data retention policies
  • Data deletion procedures and mechanisms
  • Data archiving procedures and mechanisms
  • Legal hold

 

Design & implement auditability, traceability & accountability of data events
  • Definition of event sources and requirement of event attributes
  • Logging, storage and analysis of data events
  • Chain of custody and non-repudiation

 

Module 03: Cloud Platform & Infrastructure Security

Comprehend cloud infrastructure & platform components
  • Physical environment
  • Network and communications
  • Compute
  • Virtualization
  • Storage
  • Management plane

 

Design a secure data center
  • Logical design
  • Physical design
  • Environmental design
  • Design resilient

 

Analyze risks associated with cloud infrastructure & platform

Risk assessment
Cloud vulnerabilities, threats and attacks
Risk mitigation strategies

Plan & implementation of security controls

Physical and environmental protection
System, storage and communication protection
Identification, authentication and authorization in cloud environments
Audit mechanisms

Plan business continuity (BC) & disaster recovery (DR)
  • Business continuity (BC) / disaster recovery (DR) strategy
  • Business requirements
  • Creation, implementation and testing of plan

 

Module 04: Cloud Application Security

Advocate training & awareness for application security
  • Cloud development basics
  • Common pitfalls
  • Common cloud vulnerabilities

 

Describe the security software development life cycle (SDLC) process
  • Business requirements
  • Phases and methodologies

 

Apply the secure software development life cycle (SDLC) process
  • Cloud-specific risks
  • Threat modeling 
  • Avoid common vulnerabilities during development
  • Secure coding 
  • Software configuration management and versioning

 

Apply cloud software assurance & validation
  • Functional and non-functional testing
  • Security testing methodologies
  • Quality assurance
  • Abuse case testing

 

Use verified secure software
  • Securing application programming interfaces (API)
  • Supply-chain management
  • Third-party software management
  • Validated open-source software

 

Comprehend the specifics of cloud application architecture
  • Supplemental security components
  • Cryptography
  • Sandboxing
  • Application virtualization and orchestration

 

Design appropriate identity & access management (IAM) solutions
  • Federated identity
  • Identity providers (IdP)
  • Single sign-on (SSO)
  • Multi-factor authentication (MFA)
  • Cloud access security broker (CASB)
  • Secrets management

 

Module 05: Cloud Security Operations

Build & implement physical & logical infrastructure for cloud environment
  • Hardware specific security configuration requirements
  • Installation and configuration of management tools
  • Virtual hardware specific security configuration requirements
  • Installation of guest operating system (OS) virtualization toolsets

 

Operate & maintain physical & logical infrastructure for cloud environment
  • Access controls for local and remote access
  • Secure network configuration
  • Network security controls 
  • Operating system (OS) hardening through the application of baselines, monitoring and remediation
  • Patch management
  • Infrastructure as Code (IaC) strategy
  • Availability of clustered hosts
  • Availability of guest operating system (OS)
  • Performance and capacity monitoring
  • Hardware monitoring 
  • Configuration of host and guest operating system (OS) backup and restore functions
  • Management plane

 

Implement operational controls & standards
  • Change management
  • Continuity management
  • Information security management
  • Continual service improvement management
  • Incident management
  • Problem management
  • Release management
  • Deployment management
  • Configuration management
  • Service level management
  • Availability management
  • Capacity management

 

Support digital forensics
  • Forensic data collection methodologies
  • Evidence management
  • Collect, acquire, and preserve digital evidence

 

Manage communication with relevant parties
  • Vendors
  • Customers
  • Partners
  • Regulators
  • Other stakeholders

 

Manage security operations
  • Security operations center (SOC)
  • Intelligent monitoring of security controls
  • Log capture and analysis
  • Incident management
  • Vulnerability assessments

 

Module 06: Legal, Risk & Compliance

Articulate legal requirements & unique risks within the cloud environment
  • Conflicting international legislation 
  • Evaluation of legal risks specific to cloud computing
  • Legal framework and guidelines
  • eDiscovery
  • Forensics requirements

 

Understand privacy issues
  • Difference between contractual and regulated private data
  • Country-specific legislation related to private data
  • Jurisdictional differences in data privacy
  • Standard privacy requirements
  • Privacy Impact Assessments (PIA)

 

Understand audit process, methodologies & required adaptions for a cloud environment
  • Internal and external audit controls
  • Impact of audit requirements 
  • Identify assurance challenges of virtualization and cloud
  • Types of audit reports
  • Restrictions of audit scope statements
  • Gap analysis
  • Audit planning 
  • Internal information security management system
  • Internal information security controls system
  • Policies 
  • Identification and involvement of relevant stakeholders 
  • Specialized compliance requirements for highly-regulated industries 
  • Impact of distributed information technology (IT) model

 

Understand implications of cloud to enterprise risk management
  • Assess providers risk management programs
  • Difference between data owner/controller vs. data custodian/processor
  • Regulatory transparency requirements
  • Risk treatment
  • Different risk frameworks
  • Metrics for risk management
  • Assessment of risk environment

 

Understand outsourcing & cloud contract design
  • Business requirements
  • Vendor management
  • Contract management
  • Supply-chain management

 

About this course

$ 150

}

Duration

40hrs

Module

6

Need Help?
Get instant support from our team

Chat on WhatsApp

$ 150

}

8

Module

6