Upgrade your skills with an extra 25% off selected courses with codeMTA25
CCSK

Cloud Computing Security Knowledge

195.0000 2023-12-30 CCSK 195.0000
104 104 104 0 Cloud Computing Security Knowledge course provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. https://mytrainingacademy.org.uk/pub/media/catalog/product/9/_/9_2_2.jpg
  • Price

    £195.00 including VAT (was £495.00)

    Offer ends 31 March 2024

    Save £300.00
  • Course Type Online Course
  • Course Duration 10 Hours
  • Course Access 12 Months
  • Awarded By CCSK
  • Student Discount Card All students enrolled on this course are eligible to apply for a TOTUM Pro card
Share
CCSK
Cloud Computing Security Knowledge course provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam.
-
+
Course Description

As cloud computing shows itself to be the future of information technology, several studies have pointed to the necessity of addressing the IT industry's skills gap and training professionals in both cloud computing and security.

Cloud computing is being aggressively adopted on a global basis as businesses seek to reduce costs and improve their agility. And one of the critical needs of the industry is to provide training and certification of professionals to assure that cloud computing is implemented responsibly, and with the appropriate security controls.

My Training Academy's Cloud Computing Security Knowledge course provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery

The course is of particular interest to:

  • IT infrastructure managers who need to understand and plan for Cloud adoption.
  • IT professionals who need to better understand Cloud technologies.
  • IT systems engineers who need to understand Cloud configuration, deployment and support.
  • Professionals working within the Cloud IT sector who want to achieve the vendor neutral Cloud Security CCSK qualification.

Upon completing this course, the students will be experts in the following topics:

  • Pass the CCSK Exam
  • Understanding cloud computing security challenges
  • Cloud computing security controls recommendation
  • Elasticity, Resiliency and Measured Usage
  • Understand the cloud computing architectural framework

The course has been designed to give you real-world knowledge that you can put to use from day one. It's highly flexible, so you can set your own timetable and study at your own pace. 

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

Please note: This Cloud Computing Security Knowledge (CCSK) course is not based on the current CCSK exam objectives. However, this course still retains value as a training resource and learners will received an MTA certificate of completion after completing their course.

Bulk discounts

Bulk discounts are available on purchases of 10 or more courses.

If you wish to discuss a large individual order for this course, and/or would like to be invoiced in advance, please call our sales team on 0808 175 1269 to make an enquiry.

Course Assessment Process

You'll sit an online exam. We provide interactive quizzes after each module and a mock exam at the end of your course to ensure you're fully prepared for the real thing. Once you've passed with at least 80%, you'll be able to book your exam as a private candidate.

Exam Code:

  • CCSK

To make life easier, we can give you all the information you need to book your exam. Please note that the CCSK exam fees aren’t included in the course price.

Once you’re fully prepared and ready to sit your exam, all you’ll have to do is purchase your exam voucher and take your exam online.

Got a question about exams? Contact our course advisors by email or by phone on 0808 175 1269. We're happy to help!

Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player.

Career Path

We've put together a list of relevant job titles you can apply for after achieving the Cloud Computing Security Knowledge certification (note that some careers may require further study, training and/or work experience):

  • Cloud Computing Consultant
  • Cloud Coach
  • Cloud Engineer
  • Cloud Architect
  • Cloud Developer
  • Cloud Specialist

Career Advice

Once you have achieved your certification, you'll have full access to our recruitment package for a wide range of information and advice - including:

  • How to put together a killer CV, Covering Letters and Thank You emails.
  • How to gain relevant work experience.
  • How to prepare for interviews.
  • How to understand Job adverts.
  • How to choose the right recruitment agency.
  • How to look for work on LinkedIn.
  • Information on dealing with redundancy.

Our careers advice section is available for you to see now. For more information about our career advice services, contact us on 0808 175 1269 to speak with one of our friendly course advisors today.

Course Outline

Course Syllabus

1: Architecture

  • NIST Definitions
  • Essential Characteristics
  • Service Models
  • Deployment Models
  • Multi-Tenancy
  • CSA Cloud Reference Model
  • Jericho Cloud Cube Model
  • Cloud Security Reference Model
  • Cloud Service Brokers
  • Service Level Agreements

2: Governance and Enterprise Risk Management

  • Contractual Security Requirements
  • Enterprise and Information Risk Management
  • Third Party Management Recommendations
  • Supply chain examination
  • Use of Cost Savings for Cloud

3: Legal Issues: Contracts and Electronic Discovery

  • Consideration of cloud-related issues in three dimensions
  • E-Discovery considerations
  • Jurisdictions and data locations
  • Liability for activities of subcontractors
  • Due diligence responsibility
  • Federal Rules of Civil Procedure and electronically stored information
  • Metadata
  • Litigation hold

4: Compliance and Audit Management

  • Definition of Compliance
  • Right to audit
  • Compliance impact on cloud contracts
  • Audit scope and compliance scope
  • Compliance analysis requirements
  • Auditor requirements

5: Information Management and Data Security

  • Six phases of the Data Security Lifecycle and their key elements
  • Volume storage
  • Object storage
  • Logical vs physical locations of data
  • Three valid options for protecting data
  • Data Loss Prevention
  • Detection Data Migration to the Cloud
  • Encryption in IaaS, PaaS & SaaS
  • Database Activity Monitoring and File Activity Monitoring
  • Data Backup
  • Data Dispersion
  • Data Fragmentation

6: Interoperability and Portability

  • Definitions of Portability and Interoperability
  • Virtualization impacts on Portability and Interoperability
  • SAML and WS-Security
  • Size of Data Sets
  • Lock-In considerations by IaaS, PaaS & SaaS delivery models
  • Mitigating hardware compatibility issues

7: Traditional Security, Business Continuity, and Disaster Recovery

  • Four D's of perimeter security
  • Cloud backup and disaster recovery services
  • Customer due diligence related to BCM/DR
  • Business Continuity Management/Disaster Recovery due diligence
  • Restoration Plan
  • Physical location of cloud provider

8: Data Center Operations

  • Relation to Cloud Controls Matrix
  • Queries run by data center operators
  • Technical aspects of a Provider's data center operations for customers
  • Logging and report generation in multi-site clouds

9: Incident Response

  • Factor allowing for more efficient and effective containment and recovery in a cloud
  • Main data source for detection and analysis of an incident
  • Investigating and containing an incident in an Infrastructure as a Service environment
  • Reducing the occurrence of application level incidents
  • How often should incident response testing occur
  • Offline analysis of potential incidents

10: Application Security

  • Identity, entitlement, and access management (IdEA)
  • SDLC impact and implications
  • Differences in S-P-I models
  • Consideration when performing a remote vulnerability test of a cloud-based application
  • Categories of security monitoring for applications
  • Entitlement matrix

11: Encryption and Key Management

  • Adequate encryption protection of data in the cloud
  • Key management best practices, location of keys, keys per user
  • Relationship to tokenization, masking, anonymization and cloud database controls

12: Identity, Entitlement, and Access Management

  • Relationship between identities and attributes
  • Identity Federation
  • Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
  • SAML and WS-Federation
  • Provisioning and authoritative sources

13: Virtualization

  • Security concerns for hypervisor architecture
  • VM guest hardening, blind spots, VM Sprawl, data Commingling, instant-on gaps
  • In-Motion VM characteristics that can create a serious complexity for audits
  • How can virtual machine communications bypass network security controls
  • VM attack surfaces
  • Compartmentalization of VMs

14: Security as a Service

  • 10 categories
  • Barriers to developing full confidence in security as a service (SECaaS)
  • Deployment of Security as a Service in a regulated industry prior SLA
  • Logging and reporting implications
  • How can web security as a service be deployed
  • What measures do Security as a Service providers take to earn the trust of their customers
  • ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
  • Isolation failure
  • Economic Denial of Service
  • Licensing Risks
  • VM hopping
  • Five key legal issues common across all scenarios
  • Top security risks in ENISA research
  • OVF
  • Underlying vulnerability in Loss of Governance
  • User provisioning vulnerability
  • Risk concerns of a cloud provider being acquired
  • Security benefits of cloud
  • Risks
  • Data controller vs data processor definitions in Infrastructure as a Service (IaaS), who is responsible for guest systems monitoring
Training Features
  • feature
    EXPERT INSTRUCTOR-LED TRAINING

    We only uses the industry’s finest instructors to develop our courses. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

     
  • feature
    QUIZZES & EXAM SIMULATORS

    Our custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Our Courses also include practice exams designed to replicate and mirror the environment in the testing centre. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

     
  • feature
    VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS

    Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Our Courseware always focuses on real world scenarios and skill-set development.

     
  • feature
    NAVIGATION & CONTROLS

    Our self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

     
  • feature
    SOCIAL LEARNING & NETWORKING

    We Have designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

     
  • feature
    FLASH CARDS & EDUCATIONAL GAMES

    Our Courseware knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

     
  • feature
    12 MONTHS UNLIMITED ACCESS

    Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.

     
Payment Options

For purchases of 1 to 9 user enrolments select the number of users you require and add the course to your shopping basket by selecting Add to Basket. You will then be able to make payment using most credit and debit cards or a PayPal account. Once payment is confirmed, we’ll process your order and email your course login instructions.

For a licence for 10 or more user enrolments, discounts, or if you would like to pay by BACs transfer or by invoice, please contact us on 0808 175 1269 or email sales@mytrainingacademy.org.uk.

Purchase Order Payments: To pay and enrol for courses using a purchase order (PO), please email your PO details to sales@mytrainingacademy.org.uk.

TOTUM PRO Card

All students enrolled on this course are eligible to apply for a TOTUM PRO Card, which offers discounts in a wide range of shops and websites, helping you get money off food, holidays and flights, clothes, make-up gym memberships and much more.

TOTUM PRO card is aimed at professional learners, giving you access to exclusive discounts. Explore the full list of offers.

Student Reviews

We make it our absolute mission to give you the training you need and the service you deserve. Hear what our students say about us...

£495.00 £195.00

Save £300.00

Was £495.00 (Offer ends 31/03/2024)
Cloud Computing Security Knowledge
-
+
 
Monthly Instalments
Enquire now

Speak to an advisor

+44 (0)808 175 1269

This is a local rate number

klarna

Spread the cost

Interest-free instalments

Read more...

14-Day money-back guarantee

Buying for your team?


Enquire now

Privacy
Protected

Secure
Checkout

We're trusted by
Individuals, small businesses and large corporations who continuously put their trust in My Training Academy.
We are privileged to have trained individuals who work for some of the world’s largest companies, including: