(ISC)² Certified Cloud Security Professional (CCSP) Exam Preparation
More Information:
- Learning Style: Virtual
- Provider: ISC2
- Difficulty: Beginner
- Course Duration: 5 Days
- Course Info: Download PDF
- Certificate: See Sample
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information
About this course:
ISC 2 certified Cloud Security Professional Exam (CCSSP) preparation course is an instructor lead, five day course. The courseware covers all the aspects of the cloud security certification exams; it includes strategies of securing data and system. Recording and detecting attacks and working alongside security agencies. It also covers the legalities and privacy protection in case of collaboration with the law enforcement agencies.
Course Objectives:
- Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
- Differentiate between various as-a-service delivery models and frameworks that are incorporated into the cloud computing reference architecture
- Explain strategies for protecting data at rest and data in motion
- Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies, and working with authorities during legal investigations
- Contrast between forensic analysis in corporate data center and cloud computing environments
Prerequisites:
-
Five years of cumulative, full-time working experience in IT (three of which must be in information security, and one of which must be in one of the six CCSP CBK domains)
Exam Information:
-
This course includes a voucher to take the CCSP exam at any Pearson VUE Test Center location
You Will Learn How To
- Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
- Differentiate between various as-a-service delivery models and frameworks that are incorporated into the cloud computing reference architecture
- Explain strategies for protecting data at rest and data in motion
- Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies and working with authorities during legal investigations
- Contrast between forensic analysis in corporate data center and cloud computing environments