07314600600
+1-307-387-5278
Courses

 

Course Package

Exam Voucher by CSA

Official Training Material from CSA

Official CCSK E-Book

Highly Experienced & Accredited Instructor

Live Instructor-Led Sessions

Real Life Examples & Case Studies

 

Target Audience for CCSK Training Course

 

  • Cybersecurity analysts 

  • Security Engineers 

  • Security Architects 

  • Enterprise Architects 

  • Security Administrators 

  • Compliance Managers 

  • Security Consultants 

  • Systems Engineers 

  • CISOs 

 

Pre-requisites of CCSK Certification Training
 

A basic understanding of Cloud Computing is recommended .

 

CCSK Preparation Exam and Certification information 

 

  • Exam Provider – CSA (Cloud Security Alliance) 
  • Type – MCQ Exam 
  • No of Questions – 60 
  • Duration – 90 Minutes 

 

CCSK Certification Journey 

 

 

Course Outline

Module 1. Cloud Architecture
  • The fundamentals of cloud computing, including definitions, architectures, and the role of virtualization.  
  • Key topics include cloud computing service models, delivery models, and fundamental characteristics.
  • It also introduces the Shared Responsibilities Model and a framework for approaching cloud security. 
Module 2. Infrastructure Security for Cloud
  • Delves into the details of securing the core infrastructure for cloud computing- including cloud components, networks, management interfaces, and administrator credentials.
  • It delves into virtual networking and workload security, including the basics of containers and serverless. 
Module 3. Managing Cloud Security and Risk
  • Covers important considerations for managing security for cloud computing. It begins with risk assessment and governance, then covers legal and compliance issues, such as discovery requirements in the cloud.
  • It also covers important CSA risk tools including the CAIQ, CCM, and STAR registry. 
Module 4. Data Security for Cloud Computing
  • Covers information lifecycle management for the cloud and how to apply security controls, with an emphasis on the public cloud.
  • Topics include the Data Security Lifecycle, cloud storage models, data security issues with different delivery models, and managing encryption in and for the cloud, including customer managed keys (BYOK). 
Module 5. Application Security and Identity Management for Cloud Computing
  • Covers identity management and application security for cloud deployments.
  • Topics include federated identity and different IAM applications, secure development, and managing application security in and for the cloud. 
Module 6. Cloud Security Operations
  • Key considerations when evaluating, selecting, and managing cloud computing providers.
  • We also discuss the role of Security as a Service providers and the impact of cloud on Incident Response.