Course Overview
This accelerated training prepares IT and security professionals for the (ISC)² CCSP certification while developing practical skills to secure cloud environments. Covering all six domains of the CCSP Common Body of Knowledge (CBK), the course provides hands-on experience with cloud security architecture, operations, and compliance across major platforms (AWS, Azure, GCP). Participants will gain expertise in implementing cloud security controls that meet regulatory requirements and industry best practices.
Course Objectives
Upon completion, participants will be able to:
✔ Design and implement secure cloud architectures
✔ Apply data security lifecycle management in cloud environments
✔ Manage cloud identity/access and implement security controls
✔ Evaluate cloud provider security offerings and SLAs
✔ Ensure compliance with relevant laws and regulations
✔ Prepare for the (ISC)² CCSP certification exam
Who Should Attend
This course is ideal for:
◼ Cloud security architects and engineers
◼ Security administrators transitioning to cloud
◼ IT risk and compliance professionals
◼ Enterprise architects working with cloud solutions
◼ CISOs and security managers overseeing cloud deployments
Course Content
Day 1: Cloud Concepts & Architecture
- Cloud computing concepts and service models (IaaS/PaaS/SaaS)
• Cloud reference architecture components
• Virtualization security considerations
• Workshop: Comparing cloud provider security models
Day 2: Cloud Data Security
- Cloud data lifecycle management
• Storage architectures and security controls
• Data discovery and classification techniques
• Hands-on: Implementing cloud encryption solutions
Day 3: Cloud Platform Security
- Identity and Access Management (IAM) best practices
• Security as a Service (SecaaS) solutions
• Container and serverless security
• Lab: Configuring cloud-native security tools
Day 4: Cloud Application Security
- Secure Software Development Lifecycle (SDLC) for cloud
• API security and management
• DevSecOps implementation strategies
• Case study: Cloud application penetration testing
Day 5: Operations & Legal Compliance
- Incident response in cloud environments
• Cloud forensics and audit methodologies
• Legal and compliance requirements (GDPR, HIPAA, FedRAMP)
• Capstone exercise: Building a cloud security program