Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
148 views6 pages

Syllabus - CCSP

The Certified Cloud Security Professional (CCSP) course, taught by Elizabeth Sims, focuses on cloud security best practices and prepares participants for the (ISC)2 CCSP exam. It targets IT and security professionals with prerequisites including five years of IT experience and familiarity with major cloud service providers. The course covers six domains, including cloud concepts, data security, and legal compliance, through a structured outline of modules and lessons.

Uploaded by

basura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views6 pages

Syllabus - CCSP

The Certified Cloud Security Professional (CCSP) course, taught by Elizabeth Sims, focuses on cloud security best practices and prepares participants for the (ISC)2 CCSP exam. It targets IT and security professionals with prerequisites including five years of IT experience and familiarity with major cloud service providers. The course covers six domains, including cloud concepts, data security, and legal compliance, through a structured outline of modules and lessons.

Uploaded by

basura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Course Syllabus

Certified Cloud Security Professional (CCSP)

Instructor Name: Elizabeth Sims Course Creation Date: Nov 22, 2024

Course Description and Goals

Course Description: This course is a deep dive into cloud security, exploring best practices
and advanced techniques to design, manage, and secure data, applications, and infrastructure
in cloud environments. Upon completing this course, you will be prepared to take and pass the
(ISC)2 Certified Cloud Security Professional (CCSP) exam. The CCSP exam consists of 150
multiple-choice questions with a four-hour time limit. The exam covers the following six domains:
- Domain 1 - Cloud Concepts, Architecture and Design (17%)
- Domain 2 - Cloud Data Security (20%)
- Domain 3 - Cloud Platform and Infrastructure Security (17%)
- Domain 4 - Cloud Application Security (17%)
- Domain 5 - Cloud Security Operations (16%)
- Domain 6 - Legal, Risk and Compliance (13%)

Target Audience: This course is tailored for IT, cyber, information, and software security
professionals, including Cloud Architects, Engineers, Consultants, Administrators, Analysts,
Developers, and those auditing cloud services.

Course Level: Intermediate

Prerequisites: To become certified as a CCSP, participants should have a minimum of five


years of full-time IT experience, with three years in security and at least one year in any of the
(ISC)2 CCSP CBK domains.

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
For a smoother learning experience, a foundational understanding of cybersecurity concepts,
akin to CompTIA's Security+, is recommended. Prior certifications like CISSP can also be
advantageous. Additionally, learners should be somewhat familiar with at least one of the major
cloud service providers: AWS (AWS Certified Solutions Architect - Associate), Azure (Microsoft
Certified: Azure Administrator Associate), or Google Cloud Platform (Associate Cloud Engineer).

Recommended Resources:
- The Official (ISC)2 CCSP CBK Reference (4th Edition)
- (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (3rd Edition)
- (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (3rd Edition)
- (ISC)2 Official Exam Prep App

Additional Resources:
- OWASP Top Ten
- OWASP Cloud-Native Application Security Top 10
- OWASP Logging Cheat Sheet
- SANS CWE Top 25 Most Dangerous Software Errors
- CSA Egregious Eleven

Course Goals: By the end of this course, learners should be able to:

❏ Grasp foundational principles of cloud concepts, architecture, and design


❏ Develop and apply techniques to ensure data security in cloud environments
❏ Assess and design secure cloud platforms and infrastructures
❏ Recognize and address vulnerabilities in cloud application development and deployment
❏ Operate and manage security protocols within cloud environments effectively
❏ Understand and address legal, risk, and compliance challenges in cloud computing
❏ Equip oneself with knowledge and skills to pass the (ISC)2 CCSP exam

Course Outline

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Module 1 | Cloud Concepts, Architecture and Design
Lesson 1.1: Introduction to CCSP
Lesson 1.2: Domain 1 Overview
Lesson 1.3: Cloud Computing Definitions, Roles, and Responsibilities
Lesson 1.4: Key Cloud Computing Characteristics
Lesson 1.5: Building Block Technologies
Lesson 1.6: Cloud Activities, Service Capabilities/Categories, and Deployment Models
Lesson 1.7: Cloud-Shared Considerations
Lesson 1.8: Impact of Related Technologies
Lesson 1.9: Cryptography and Key Management
Lesson 1.10: Identity and Access Control
Lesson 1.11: Data and Media Sanitization
Lesson 1.12: Network Security
Lesson 1.13: Virtualization Security
Lesson 1.14: Common Threats
Lesson 1.15: Security Hygiene
Lesson 1.16: Cloud Secure Data Lifecycle
Lesson 1.17: Business Continuity (BC) and Disaster Recovery (DR) in the Cloud
Lesson 1.18: Business Impact Analysis (BIA), and Functional Security Requirements
Lesson 1.19: Security Considerations for Service Models, and Cloud Design Patterns
Lesson 1.20: DevOps Security
Lesson 1.21: Verifications and Certifications Using Common Standards
Lesson 1.22: Module 1 Review
Lesson 1.23: Module 1 Quiz

Module 2 | Cloud Data Security


Lesson 2.1: Domain 2 Overview
Lesson 2.2: Cloud Data Life Cycle, Data Dispersion, and Data Flows
Lesson 2.3: Storage Types
Lesson 2.4: Storage Threats
Lesson 2.5: Encryption and Key Management
Lesson 2.6: Hashing, Data Obfuscation, and Tokenization
Lesson 2.7: Data Loss Prevention (DLP), Keys, Secrets, and Certificates
Lesson 2.8: Structured, Unstructured, and Semi-Structured Data, and Data Location

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Lesson 2.9: Data Classification Policies
Lesson 2.10: Data Mapping and Labeling
Lesson 2.11: Information Rights Management
Lesson 2.12: Data Retention Policies
Lesson 2.13: Data Deletion, Archiving, and Legal Hold
Lesson 2.14: Enable Data Audit, Trace, & Accountability
Lesson 2.15: Module 2 Review
Lesson 2.16: Module 2 Quiz

Module 3 | Cloud Platform and Infrastructure Security


Lesson 3.1: Domain 3 Overview
Lesson 3.2: Physical Environment
Lesson 3.3: Network, Communications, and Compute
Lesson 3.4: Virtualization
Lesson 3.5: Storage
Lesson 3.6: Management Plane
Lesson 3.7: Design a Secure Data Center
Lesson 3.8: Risk Analysis
Lesson 3.9: Cloud Vulnerabilities, Threats, Attacks, and Risk Mitigation
Lesson 3.10: Physical and Environmental Protection
Lesson 3.11: System, Storage, and Communication Protection
Lesson 3.12: Identification, Authentication, and Authorization in the Cloud
Lesson 3.13: Audit Mechanisms
Lesson 3.14: Business Continuity (BC) and Disaster Recovery (DR) Strategies
Lesson 3.15: Business Requirements
Lesson 3.16: BC and DR Planning and Testing
Lesson 3.17: Module 3 Review
Lesson 3.18: Module 3 Quiz

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Module 4 | Cloud Application Security
Lesson 4.1: Domain 4 Overview
Lesson 4.2: Cloud Development Basics, Common Pitfalls, and Vulnerabilities
Lesson 4.3: Secure Software Development
Lesson 4.4: Business Requirements, Phases, and Methodologies
Lesson 4.5: Cloud Specific Risks
Lesson 4.6: Threat Modeling
Lesson 4.7: Layered Security, Secure Coding, and Configuration
Lesson 4.8: Cloud Software Assurance and Validation
Lesson 4.9: Application Testing
Lesson 4.10: Securing Application Programming Interfaces (APIs) and Supply-Chains
Lesson 4.11: Validating and Managing Third-Party and Open-Source Software
Lesson 4.12: Supplemental Security Components
Lesson 4.13: Cryptography, Sandboxing, Virtualization, and Orchestration
Lesson 4.14: Federated Identity, Identity Providers (IdP), and Single Sign-On (SSO)
Lesson 4.15: Multi-Factor Authentication (MFA), Cloud Access Security Brokers (CASB),
and Secrets Management
Lesson 4.16: Module 4 Review
Lesson 4.17: Module 4 Quiz

Module 5 | Cloud Security Operations


Lesson 5.1: Domain 5 Overview
Lesson 5.2: Hardware Security
Lesson 5.3: Virtualization Management, Security, and Tool Sets
Lesson 5.4: Remote Access
Lesson 5.5: Secure Network Configurations and Controls
Lesson 5.6: Operating System Hardening and Configuration
Lesson 5.7: Availability of Hosts, and Guest Operating Systems
Lesson 5.8: Performance, Capacity, and Hardware Monitoring
Lesson 5.9: Infrastructure as Code and the Management Plane
Lesson 5.10: Program Management: Part 1
Lesson 5.11: Program Management: Part 2
Lesson 5.12: Program Management: Part 3
Lesson 5.13: Program Management: Part 4

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
Lesson 5.14: Forensics, Evidence Collection and Preservation
Lesson 5.15: Communication and Cloud Stakeholders
Lesson 5.16: Security Operations and Intelligent Monitoring
Lesson 5.17: Logging, Incident Management, and Vulnerability Assessments
Lesson 5.18: Module 5 Review
Lesson 5.19: Module 5 Quiz

Module 6 | Legal, Risk and Compliance


Lesson 6.1: Domain 6 Overview
Lesson 6.2: Cloud Legal Requirements
Lesson 6.3: Legal Frameworks and Forensics
Lesson 6.4: Privacy in the Cloud
Lesson 6.5: Privacy in the Cloud: Part 2
Lesson 6.6: Cloud Auditing
Lesson 6.7: Audit Analysis
Lesson 6.8: Distributed Infrastructure and Compliance
Lesson 6.9: Enterprise Risk Management
Lesson 6.10: Enterprise Risk Management: Part 2
Lesson 6.11: Outsourcing and Cloud Contracts
Lesson 6.12: Module 6 Review
Lesson 6.13: Module 6 Quiz

Module 7 | Practice Test


Lesson 7.1: Practice Test

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6

You might also like