Cloud Computing Security Knowledge (CCSK)

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam.

$29.99

Description

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery.

Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework.

About this CCSK Foundation online self-paced training course

This course provides students thorough coverage of fundamentals of cloud security and prepares them to take the Cloud Security Alliance CCSK certification exam. The online training course begins with a detailed description of cloud computing and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and become experts in the following topics:

  • Understanding cloud computing
  • Technical understanding of security challenges
  • Understanding of security fundamentals and cloud computing security
  • Broad understanding controls recommendation
  • High level of confidence with elasticity, resiliency, and measured usage
  • Understand cloud computing architecture framework.
  • Identity and Access Management
  • Aspects of virtualization used and audit management Virtualization

About the Certificate of Cloud Security Knowledge (CCSK) certification

Organizations that are making the move to the cloud need professionals familiar with this kind of work. Holding the CCSK Certificate, a well-respected credential for cloud security, will give you a deeper understanding of how to ensure data safety in this domain. Furthermore, obtaining your CCSK qualification is required if you’re interested in becoming certified in a service provider or job role.

By achieving the CCSK certification, you could get an extensive expertise in constructing a reputable cloud security plan according to authorized protocols. It includes different branches, starting from premier practices for IAM and application security, data encryption procedures and SecaaS, as well as basics for protecting developing technologies.

Course Outline

Cloud Computing Security Knowledge (CCSK) Course Outline

Download Course Outline

Cloud Security Overview-Part1

Cloud Security Overview-Part2

Cloud Diagrams

Cloud Services

Risk Management

Corporate Governance

Enterprise Risk Management

Risk Management Balance Process Supply Chain Security

ERM Incidents Recommendations-Part1

ERM Incidents Recommendations-Part2

ERM Incidents Recommendations-Part3

Cloud Legal Issues-Part1

Cloud Legal Issues-Part2

Cloud Legal Issues-Part3

Audits

Compliance And Audit

Audit Recommendations

Audit Requirements

Information And Security

Storage

Information Governance Classification

Data Security

Protecting Data Moving

Client Database Encryption

PaaS Encryption

Interoperability And Portability

Interoperability Recommendations

Portability Recommendations

Recommendations SAAS

Business Continuity And Disaster Recovery

Assessing CSP Security

Equipment Maintenance

Recommendations

Data Center Operations

Incident Response

Testing

IaaS

C.E.R.- Containment, Eradication, And Recovery

Application Security

Security Testing

Audit Compliance

Security Assurance Recommendations

Encryption And Key Management

Content Aware Encryption

Storage Of Keys

Building Access Control

Intro To Identity

Entitlement Process

Trust With Identity

Recommendations For Identity Management/p>

Virtualization

Hypervisor And Virtual Machine

Inter-Virtual Machine Attacks

Virtual Machine Encryption

Virtual Machine Recommendations And Requirements

Security As A Service

Security Offerings

Intrusion Detection Prevention

Business Continuity And Disaster Recovery

European CCSK

Top Security Benefits

European Legal Based Issues

Your Training Instructor

Dean Bushmiller
Lead Instructor for Expanding Security

$29.99

Course features:

9 Hrs 20 Min

62 VIDEOS

1 Year Access

Available on Web