CCSK Certificate of Cloud Security Knowledge training course

CCSK Certificate of Cloud Security Knowledge

CLS is The Sole Accredited Training Provider for CSA Cloud Security Allience in Egypt.
The Certificate of Cloud Security Knowledge (CCSK), the industry’s first user certification for secure cloud computing.

Course Overivew

The Certificate of Cloud Security Knowledge (CCSK), the industry’s first user certification for secure cloud computing.

  • The CCSK is designed to ensure that a broad range of professionals with a responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud.
  • What are the benefits of earning your CCSK?
    • Prove your competency in key cloud security issues through an organization that specializes in cloud research.
    • Increase employment opportunities by filling the skills-gap for cloud-certified professionals.
    • Demonstrate your technical knowledge, skills, and abilities to effectively use controls tailored to the cloud.
    • Learn to establish a baseline of security best practices when dealing with a broad array of responsibilities, from cloud governance to configuring technical security controls.
    • Complement other credentials such as the CCAK, CISA, CISSP and CCSP.
Read More
Read Less
Course Benefits:

Module 1. Cloud Architecture

  • The fundamentals of cloud computing, including definitions, architectures, and the role of virtualization.
  • Key topics include cloud computing service models, delivery models, and fundamental characteristics.
  • It also introduces the Shared Responsibilities Model and a framework for approaching cloud security.

Topics Covered:

  • Unit 1 – Introduction to Cloud Computing
  • Unit 2- Introduction & Cloud Architecture
  • Unit 3 – Cloud Essential Characteristics
  • Unit 4 – Cloud Service Models
  • Unit 5 – Cloud Deployment Models
  • Unit 6 – Shared Responsibilities

Module 2. Infrastructure Security for Cloud

  • Delves into the details of securing the core infrastructure for cloud computing- including cloud components, networks, management interfaces, and administrator credentials.
  • It delves into virtual networking and workload security, including the basics of containers and serverless.

Topics Covered:

  • Unit 1 – Module Intro
  • Unit 2 – Intro to Infrastructure Security for Cloud Computing
  • Unit 3 – Software Defined Networks
  • Unit 4 – Cloud Network Security
  • Unit 5 – Securing Compute Workloads
  • Unit 6 – Management Plane Security
  • Unit 7 – BCDR

Module 3. Managing Cloud Security and Risk

  • Covers important considerations for managing security for cloud computing.
  • It begins with risk assessment and governance, then covers legal and compliance issues, such as discovery requirements in the cloud.
  • It also covers important CSA risk tools including the CAIQ, CCM, and STAR registry.

Topics Covered:

  • Unit 1 – Module Introduction
  • Unit 2 – Governance
  • Unit 3 – Managing Cloud Security Risk
  • Unit 4 – Legal
  • Unit 5 – Legal Issues In Cloud
  • Unit 6 – Compliance
  • Unit 7 – Audit
  • Unit 8 – CSA Tools

Module 4. Data Security for Cloud Computing

  • Covers information lifecycle management for the cloud and how to apply security controls, with a emphasis on public cloud.
  • Topics include the Data Security Lifecycle, cloud storage models, data security issues with different delivery models, and managing encryption in and for the cloud, including customer managed keys (BYOK).

Topics Covered:

  • Unit 1 – Module Introduction
  • Unit 2 – Cloud Data Storage
  • Unit 3 – Securing Data In The Cloud
  • Unit 4 – Encryption For IaaS
  • Unit 5 – Encryption For PaaS & SaaS
  • Unit 6 – Encryption Key Management
  • Unit 7 – Other Data Security Options
  • Unit 8 – Data Security Lifecycle

Module 5. Application Security and Identity Management for Cloud Computing

  • Covers identity management and application security for cloud deployments.
  • Topics include federated identity and different IAM applications, secure development, and managing application security in and for the cloud.

Topics Covered:

  • Unit 1 – Module Introduction
  • Unit 2 – Secure Software Development Life Cycle (SSDLC)
  • Unit 3 – Testing & Assessment
  • Unit 4 – DevOps
  • Unit 5 – Secure Operations
  • Unit 6 – Identity & Access Management Definitions
  • Unit 7 – IAM Standards
  • Unit 8 – IAM In Practice

Module 6. Cloud Security Operations

  • Key considerations when evaluating, selecting, and managing cloud computing providers.
  • We also discuss the role of Security as a Service providers and the impact of cloud on Incident Response.

Topics Covered:

  • Unit 1 – Module Introduction
  • Unit 2 – Selecting A Cloud Provider
  • Unit 3 – SECaaS Fundamentals
  • Unit 4 – SECaaS Categories
  • Unit 5 – Incident Response
  • Unit 6 – Domain 14 Considerations
  • Unit 7 – CCSK Exam Preparation

CCSK PLUS

  • The CCSK Plus Course includes all the modules in the CCSK Foundation course with additional material.
  • The CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on activities that reinforce classroom instruction.
  • Students engage in a scenario of bringing a fictional organization securely into the cloud, which gives them the opportunity to apply their knowledge by performing a series of activities that would be required in a real-world environment.
  • Below is an outline of the lab material covered in the CCSK Plus class.

Core Account Security

  • Students learn what to configure in the first 5 minutes of opening a new cloud account and enable security controls such as MFA, basic monitoring, and IAM.

IAM and Monitoring In-Depth

  • Attendees expand their work on the first lab and implement more-complex identity management and monitoring.
  • This includes expanding IAM with Attribute Based Access Controls, implementing security alerting, and understanding how to structure enterprise-scale IAM and monitoring.

Network and Instance Security

  • Students create a virtual network (VPC) and implement a baseline security configuration.
  • They also learn how to securely select and launch a virtual machine (instance), run a vulnerability assessment in the cloud, and connect to the instance.

Encryption and Storage Security

  • Students expand their deployment by adding a storage volume encrypted with a customer managed key.
  • They also learn how to secure snapshots and other data.

Application Security and Federation

  • Students finish the technical labs by completely building out a 2-tier application and implementing federated identity using OpenID.

Risk and Provider Assessment

  • Students use the CSA Cloud Controls Matrix and STAR registry to evaluate risk and select a cloud provider.
  • Cloud Computing Fundamentals

To start, you’ll need to know the fundamentals of cloud computing, including definitions, architectures, and the role of virtualization. Key topics you’ll need to be familiar with are cloud computing service models, delivery models, and the fundamental characteristics of cloud. You’ll also need to be familiar with the Shared Responsibilities Model.

  • Infrastructure Security for Cloud Computing

As far as infrastructure security goes, you’ll need to understand the details of securing the core infrastructure for cloud computing- including cloud components, networks, management interfaces, and administrator credentials. You’ll also need to understand virtual networking and workload security, including the basics of containers and serverless.

  • Managing Cloud Security and Risk

For this section you need to know the important considerations of managing security for cloud computing. That includes risk assessment and governance, as well as legal and compliance issues, such as discovery requirements in the cloud. You’ll also need to know how to use important CSA risk tools including the CAIQ, CCM, and STAR registry and how cloud impacts IT audits.

  • Data Security for Cloud Computing

One of the biggest issues in cloud security is protecting data, so you will need to understand how data is stored and secured in the cloud. You will also need to know how the data security lifecycle is impacted by cloud and how to apply security controls in a cloud environment. Other important topics include cloud storage models, data security issues with different delivery models, and managing encryption in and for the cloud, including customer managed keys (BYOK).

  • Application Security and Identity Management for Cloud Computing

Another important area you’ll be tested on is identity and access management and application security for cloud deployments. Topics you’ll need to learn include federated identity, different IAM applications, secure development, and managing application security in and for the cloud.

  • Cloud Security Operations

Lastly, you’ll be tested on key considerations when evaluating, selecting, and managing cloud computing providers. Make sure you also understand the role of Security as a Service providers and the impact of cloud on incident response.

  • Cybersecurity analysts
  • Security Engineers
  • Security Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Security Consultants
  • Systems Engineers
  • CISOs

 

Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

CCSK Certificate of Cloud Security Knowledge
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

CCSK Certificate of Cloud Security Knowledge
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request