Certified Cloud Security Professional

US$ 8.99 US$ 14.99
0
Number of Students Registered

Certified Cloud Security Professional course covers all the information you need to pass the (ICS)2 – Certified Cloud Security Professional (CCSP) exam. The workbook is designed to take a practical approach of learning with real life examples and case studies.

  • Covers complete CCSP blueprint
  • Summarized content
  • Practice Questions
  • 100% passing guarantee
  • Mind maps

CCSP Certifications

The (ICS)2 – Certified Cloud Security Professional (CCSP) certification evaluates the applicant’s knowledge of cloud security. It is administered by the International Information System Security Certification Consortium. (ISC)2, and was developed in partnership with the Cloud Security Alliance (CSA).

The CCSP is designed as the certification for mid-level security professionals who want to demonstrate their proficiency in the field of cloud security.

How does CCSP certifications help?

CCSP certification helps you boost your career in the following ways:

  1. The CCSP positions you as an authority figure on cloud security. It’s a quick way to communicate your knowledge and earn trust from your clients or senior leadership.
  2. The CCSP can enhance your working knowledge of cloud security and keep you current on evolving technologies.
  3. You can use your knowledge across a variety of different cloud platforms. This not only makes you more marketable, it ensures you are better equipped to protect sensitive data in a global environment.
  4. The CCSP created new opportunities from being able to move into more strategic roles, to being able to add new consulting services to your business.
About the CCSP Exam
  • Exam Number: (ICS)2 Certified Cloud Security Professional(CCSP)
  • Associated Certifications: CCSP
  • Duration: 240 minutes (125 questions)
  • Exam Registration: Pearson VUE

The Certified Cloud Security Professional is a 240-minutes, 125 questions assessment that is associated with the CCSP certification. This exam tests a candidate’s knowledge and skills related to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedure established by the cybersecurity experts at (ISC)2.

The following topics are general guidelines for the content likely to be included on the exam
  • Architectural Concepts & Design Requirements 19%
  • Cloud Data Security 20%
  • Cloud Platform & Infrastructure Security 19%
  • Cloud Application Security 15%
  • Operations 15%
  • Legal & Compliance 12%

Chapter 01: Architectural Concepts & Design Requirements
Technology Brief
Cloud Computing Concepts
Cloud Computing Terminologies
Cloud Computing Roles
Key Cloud Computing Characteristics
Building Block Technologies
Cloud Reference Architecture
Cloud Service Categories
Cloud Deployment Models
Cloud Cross-Cutting Aspects
Security Concepts Relevant to Cloud Computing
Access Control
Data and Media Sanitization
Virtualization Security
Common Threats
Security Considerations for Different Cloud Categories
Understand Design Principles of Secure Cloud Computing
Cloud Secure Data Life Cycle
Cloud Based Business Continuity/Disaster Recovery Planning
Cost Benefit Analysis
Functional Security Requirements
Practice Questions


Chapter 02: Cloud Data Security
Cloud Data Life Cycle (CSA Guidance)
Phases
Relevant Data Security Technologies
Cloud Data Storage Architectures
Storage Types (e.g., long-term, ephemeral, raw-disk)
Threats to Storage Types (e.g., ISO/IEC 27040)
Technologies Available to Address Threats
Data Security Strategies
Encryption
Key Management
Masking
Tokenization
Emerging Technologies
Homomorphic Encryption
Data Discovery and Classification Technologies
Data Discovery
Classification
Jurisdictional Data Protections for Personally Identifiable Information (PII)
Data Privacy Acts
Implementation of Data Discovery
Classification of Discovered Sensitive Data
Mapping and Definition of Controls
Application of Defined Controls for PII (in consideration of customer’s Data Privacy Acts)
Data Rights Management
Data Rights Objectives (e.g., provisioning, users and roles, role-based access)
Appropriate Tools (e.g., Issuing and replication of certificates) Domain
Data Retention, Deletion, and Archiving Policies
Data Retention Policies
Data Deletion Procedures and Mechanisms
Data Archiving Procedures and Mechanisms
Auditability, Traceability, and Accountability of Data Events
Definition of Event Sources
Identity Attribution Requirement
Storage and Analysis of Data Events
Continuous Optimizations
Chain of Custody
Non-repudiation
Summary:
Practice Questions


Chapter 03: Cloud Platform & Infrastructure Security
Cloud Infrastructure Components
Physical Environment
Network and Communications
Compute
Virtualization
Storage
Management Plane
Analyze Risks Associated to Cloud Infrastructure
Risk Assessment/Analysis
Cloud Attack Vectors
Virtualization Rısks
Counter-Measure Strategies
Security Controls
Physical and Environmental Protection
System and Communication Protection
Virtualization Systems Protection
Management of Identification, Authentication and Authorization in Cloud Infrastructure
Audit Mechanisms
Plan Disaster Recovery and Business Continuity Management
Understanding of the Cloud Environment
Understanding of the Business Requirements
Understanding of the Risks
Disaster Recovery/Business Continuity strategy
Creation/Implementation of the Plan
Practice Questions:


Chapter 04: Cloud Application Security
Application Security
Cloud Development Basics
Common Pitfalls
Common Vulnerabilities
Cloud Software Assurance and Validation
Cloud-based Functional Testing
Cloud Secure Software Development Life Cycle
Security Testing
Use Verified Secure Software
Approved API
Community Knowledge
Supply-Chain Management
Software Development Life-Cycle (SDLC) Process
Phases & Methodologies
Business Requirements
Software Configuration Management & Versioning
Apply the Secure Software Development Life-Cycle
Common Vulnerabilities
Cloud-Specific Risks
Quality of Service (QoS)
Threat Modelling
Specifics of Cloud Application Architecture
Supplemental Security Devices
Cryptography
Sandboxing
Application Virtualization
Identity and Access Management (IAM) Solutions
Federated Identity
Identity Providers (IP)
Single Sign-On (SSO)
Multi-factor Authentication (MFA)
Practice Questions


Chapter 05: Operations
Data Center Design
Logical Design
Physical Design
Environmental Design
Physical Infrastructure for Cloud Environment
Secure Configuration of Hardware Specific Requirements
Virtualization Management Tools for the Host
Run Physical Infrastructure for Cloud Environment
Configuration of Access Control for Local Access
Securing Network Configuration
OS Hardening via Application of Baseline (e.g., Windows, Linux, VMware)
Availability of Stand-Alone Hosts
Availability of Clustered Hosts (e.g., Distributed Resource Acheduling (DRS), Dynamic Optimization (DO), storage clusters, maintenance mode, high availability)
Manage Physical Infrastructure for Cloud Environment
Configuring Access Controls for Remote Access (e.g., RDP, Secure Terminal Access)
OS Baseline Compliance Monitoring and Remediation
Patch Management
Performance Monitoring
Hardware Monitoring
Backup and Restore of Host Configuration
Implementation of Network Security Controls (e.g., firewalls, IDS, IPS, honeypots, vulnerability assessments)
Log Capture and Analysis (e.g., SIEM, Log Management)
Management Plane
Build Logical Infrastructure for Cloud Environment
Secure Configuration of Virtual Hardware Specific Requirements
Installation of Guest O/S Virtualization Toolsets
Run Logical Infrastructure for Cloud Environment
Secure Network Configuration
OS Hardening via Application of a Baseline (e.g., Windows, Linux, VMware)
Availability of the Guest OS
Manage Logical Infrastructure for Cloud Environment
Access Control for Remote Access
OS Baseline Compliance Monitoring and Remediation
Patch Management
Performance Monitoring (e.g., Network, Disk, Memory, CPU)
Backup and Restore of Guest OS Configuration
Implementation of Network Security Controls
Log Capture and Analysis
Management Plane
Ensure Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1)
Change Management
Continuity Management
Information Security Management
Continual Service Improvement Management
Incident Management
Problem Management
Release and Deployment Management
Configuration Management
Service Level Management
Availability Management
Capacity Management
Conduct Risk Assessment to Logical and Physical Infrastructure
The Collection, Acquisition, and Preservation of Digital Evidence
Proper Methodologies for Forensic Collection of Data
Evidence Management
Manage Communication with Relevant Parties
Vendors
Customers
Partners
Regulators
Other Stakeholders
Summary
Practice Questions


Chapter 06: Legal & Compliance
Legal Requirements and Unique Risks within the Cloud Environment
International Legislation Conflicts
Appraisal of Legal Risks Specific to Cloud Computing
Legal Controls
eDiscovery (e.g., ISO/IEC 27050, CSA Guidance)
Forensics Requirements
Privacy Issues, Including Jurisdictional Variation
Difference between Contractual and Regulated PII
Country-Specific Legislation Related to PII / Data Privacy
Difference between Confidentiality, Integrity, Availability, and Privacy
Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
Internal and External Audit Controls
Impact of Requirements Programs by the Use of Cloud
Assurance Challenges of Virtualization and Cloud
Types of Audit Reports
Restrictions of Audit Scope Statements (e.g., SAS 70)
Gap Analysis
Audit Plan
Standards Requirements
Internal Information Security Management System (ISMS)
Internal Information Security Controls System
Policies
Identification and Involvement of Relevant Stakeholders
Specialized Compliance Requirements for Highly Regulated Industries
Impact of Distributed IT Model
Implications of Cloud to Enterprise Risk Management
Access Providers Risk Management
Difference between Data Owner/Controller vs. Data Custodian/Processor
Risk Mitigation
Different Risk Frameworks
Metrics for Risk Management
Assessment of Risk Environment
Outsourcing and Cloud Contract Design
Business Requirements
Vendor Management
Contract Management (e.g., right to audit, metrics, definitions, termination, litigation, assurance, compliance, access to Cloud/data)
Execute Vendor Management
Supply-chain Management (e.g., ISO/IEC 27036)
Summary


Practice Questions Answers
Acronyms
References
About Our Products

(ISC)2 Certifications

Information security careers can feel isolating! When you certify, you become a member of (ISC)² — a prima community of cyber security professionals. You can cooperate with thought leaders, network with global peers; grow your skills and so much more. The community is always here to support you throughout your career.

Get 20% instant discount when shared to your social account

*Product must be added in cart to apply coupon

Buy Now

Leave a Comment

Your email address will not be published.

You may use these HTML tags and attributes: <a href=""> <abbr> <acronym> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Send a Message