Skip to main content

Certified Cloud Security Professional (CCSP®)

Course Code: DDL-0008

FREE ACCESS

  •   Access to course content
  •   No access to labs
  •   Certificate not included

PAID ACCESS

  •   Access to course content
  •   Access to all course labs
  •   Blockchain Enabled Certificate
  •   and Badges

SCHEDULES

  • SCHEDULE A - September 12-16,2022, Monday-Friday, 7am-4pm
  • SCHEDULE B - October 24-28,2022, Monday-Friday, 6am-3pm

ABOUT THIS COURSE

Gain core knowledge and experience to successfully secure the cloud and prepare for the Certified Cloud Security Professional (CCSP®) certification.

(ISC)2 and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration.

This professional competence is measured against a globally recognised body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)2’s Certified Information Systems Security Professional (CISSP®).

OBJECTIVES

The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)2.

RECOMMENDED FOR

The CCSP is ideal for experienced cybersecurity and IT/ICT professionals who are involved in transitioning to and maintaining cloud-based solutions and services. Roles include:

  • Enterprise Architect
  • Security Administrator
  • Systems Engineer
  • Security Architect
  • Security Consultant
  • Security Engineer
  • Security Manager
  • Systems Architect

PREREQUISITES

Candidates must have a minimum of five years cumulative work experience in information technology, of which three years must be in information security and one year in one or more of the six domains of the CCSP CBK® (Common Body of Knowledge). Earning CSA’s CCSK certificate can be substituted for one year of experience in one or more of the six domains of the CCSP CBK. Earning (ISC)2’s CISSP credential can be substituted for the entire CCSP experience requirement.

MEET THE INSTRUCTORS

  • ADRIAN SMITH

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    Since completing his B.Sc. in Computer Science, Adrian has compiled over 30 years’ IT experience. During his time as a Technical Trainer at DDLS, Adrian has worked across Microsoft, Google Cloud & AWS product sets.

  • DAVID VAN GEMERT

  • SENIOR TECHNICAL TRAINER


    PROFILE SUMMARY

    David is a Technical Trainer for DDLS for Microsoft Infrastructure and Security Training, CompTIA A+, Network+ and Security+ delivering Training and Consulting in Australia and New Zealand.

  • ITVINDER MANKOO

  • PROCESS TRAINER


    PROFILE SUMMARY

    He is a highly experienced and passionate facilitator with a wealth of ‘real-world’ experience which she uses to bring to life her training courses. She is an entertaining trainer and without exception, students excel, enjoy, and learn in an environment that is supportive, educational, and fun.

  • JOHN ANG

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    An experienced Infrastructure, Security, Consulting and Project Management in Information Technology. With more than 20 years in the IT industry, recently led the Infrastructure and Security projects for one of the largest conglomerates in the country. Highly skilled in Microsoft, Symantec, CyberArk, Qualys, SolarWinds, and IT Security Policies and Procedures.

  • LOUIS CREMEN

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    Graduated B of Computer Science at University of Wollongong in 2009. Started his own software company making mobile and web apps for other companies (CommBank, RBA, Army, Government, Enterprises). Contracted to create courses to train developers how to write apps for companies (DDLS, AUC) and then as a university lecturer (UOW).

  • MICHAEL MANASAN

  • SENIOR TECHNICAL TRAINER


    PROFILE SUMMARY

    Michael is a versatile individual with a passion for technology, be it open or closed source. He is interested in infrastructure, messaging, database, and development technologies as well as management processes. Michael is continually upgrading his skillset as well as adding new skills that fancies his interest.

  • TERRY GRIFFIN

  • TECHNICAL TRAINER


    PROFILE SUMMARY

    Terry is a technology specialist and brings to the classroom his extensive experience and knowledge which he uses to keep his courses interesting to the attendees. He is known as a Microsoft, VMware, and Citrix evangelist, and brings that enthusiasm to the classroom.

  COURSE OUTLINE


  • Module 1: Cloud Concepts, Architecture and Design
    • Understand Cloud Computing Concepts
    • Describe Cloud Reference Architecture
    • Understand Security Concepts Relevant to Cloud Computing
    • Understand Design Principles of Secure Cloud Computing
    • Evaluate Cloud Service Providers

  • Module 2: Cloud Data Security
    • Describe Cloud Data Concepts
    • Design and Implement Cloud Data Storage Architectures
    • Design and Apply Data Security Technologies and Strategies
    • Implement Data Discovery
    • Implement Data Classification
    • Design and Implement Information Rights Management (IRM)
    • Plan and Implement Data Retention, Deletion and Archiving Policies
    • Design and Implement Auditability, Traceability and Accountability of Data Events

  • Module 3: Cloud Platform and Infrastructure Security
    • Comprehend Cloud Infrastructure Components
    • Design a Secure Data Centre
    • Analyse Risks Associated with Cloud Infrastructure
    • Design and Plan Security Controls
    • Plan Disaster Recovery (DR) and Business Continuity (BC)

  • Module 4: Cloud Application Security
    • Advocate Training and Awareness for Application Security
    • Describe the Secure Software Development Life Cycle (SDLC) Process
    • Apply the Secure Software Development Life Cycle (SDLC)
    • Apply Cloud Software Assurance and Validation
    • Use Verified Secure Software
    • Comprehend the Specifics of Cloud Application Architecture
    • Design Appropriate Identity and Access Management (IAM) Solutions

  • Module 5: Cloud Security Operations
    • Implement and Build Physical and Logical Infrastructure for Cloud Environment
    • Operate Physical and Logical Infrastructure for Cloud Environment
    • Manage Physical and Logical Infrastructure for Cloud Environment
    • Implement Operational Controls and Standards (e.g. ITIL®, ISO/IEC 20000-1
    • Support Digital Forensics
    • Manage Communication with Relevant Parties
    • Manage Security Operations

  • Module 6: Legal, Risk and Compliance
    • Articulate Legal Requirements and Unique Risks within the Cloud Environment
    • Understand Privacy Issues
    • Understand Audit Process, Methodologies, and Required Adaptations for a Cloud Environment
    • Understand Implications of Cloud to Enterprise Risk Management
    • Understand Outsourcing and Cloud Contract Design

Enroll
LUNA TECHNOLOGIES INC. 2022. All rights reserved.