Official (ISC)² CCSP Self-Paced Training

Course Description

This course leverages the power of artificial intelligence to guide students through a self-paced learning experience adapted to their unique needs. Providing a comprehensive review of information systems security concepts and industry best practices included in the CCSP Common Body of Knowledge (CBK), this data-driven experience brings to participants interactive study materials guided by their level of understanding and confidence, nurturing self-awareness and boosting learning efficiency.

Online, go-at-your-own-pace training using artificial intelligence that enables participants to tailor their learning to their individual needs. The experience includes interactive study materials, robust search functionality to home in on topics, analytics dashboards to track learner progress, email support in lieu of instructor, and 24/7 course availability.

The experience includes approximately 40 hours of learning content, but the time commitment depends on an individual’s tailored learning journey.

With the purchase of CCSP Self-Paced Training, each student will receive:

  • • 180-day access to official course content:
    • • Self-Paced Online Adaptive Learning Journey
    • • Data-driven analytics dashboard providing real-time feedback on learner progress
    • • Robust search functionality to home in on topics
    • • Digital Textbook
    • • Knowledge checks
    • • Sliders to gauge confidence with question answers
    • • Key Takeaways
    • • Interactive content
    • • Online interactive flash cards
    • • Practical Assessment
    • • 24x7x365 chat technical support
  • • An electronic Validation of Completion will be issued once you have completed the experience by meeting all the requirements. We recommend that you download and retain the verification of completion.?

????To download a PDF version of the validation, go to the?“Awards” tab of (ISC)2?Learn (top menu), select the course and then “Generate Certificate”.

Who Should Attend:

The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions:

  • • Cloud Architect
  • • Cloud Engineer
  • • Cloud Consultant
  • • Cloud Administrator
  • • Cloud Security Analyst
  • • Cloud Specialist
  • • Auditor of Cloud Computing Services
  • • Professional Cloud Developer

Exam domains covered in this course include:

  • • Domain 1: Cloud Concepts, Architecture and Design
  • • Domain 2: Cloud Data Security
  • • Domain 3: Cloud Platform and Infrastructure Security
  • • Domain 4: Cloud Application Security
  • • Domain 5: Cloud Security Operations
  • • Domain 6: Legal, Risk, and Compliance

Course Learning Objectives:

At the end of this course, learners will have increased their awareness and knowledge of topics covered by the six domains of the CCSP exam outline and Common Body of Knowledge.

After completing this experience, participants will be able to:?

  • • State the essential characteristics of cloud computing.?
  • • Describe fundamental cloud computing services.?
  • • Describe cloud computing reference architectures.?
  • • Explain cloud computing activities.
  • • Compare cloud service capabilities and models.?
  • • Describe cloud deployment models.?
  • • Summarize economic characteristics of cloud computing.?
  • • Summarize cloud computing security concepts.?
  • • Describe key security considerations for each service model.?
  • • Evaluate cloud computing ROI and KPI metrics.?
  • • Analyze key cloud service providers and identify the potential tools, frameworks and registries that evaluate them.?
  • • Discuss cloud data security concepts.?
  • • Interpret cloud data storage architectures.
  • • Describe cryptography.?
  • • Assess cloud data security strategies.?
  • • Explain data discovery.?
  • • Explain data classification technologies.?
  • • Analyze information rights management.?
  • • Compare solutions for cloud data retention, deletion and archival policies.?
  • • Define auditability, traceability and accountability of security-relevant data events.?
  • • Compare cloud infrastructure components.? ?
  • • Select standard practices for implementing a secure data center design.?
  • • Assess risks, vulnerability, threats and attacks in the cloud environment.? ?
  • • Discover components for planning and implementing security controls.? ?
  • • Recommend business continuity and disaster recovery (BCDR) standards.?
  • • Explain training and awareness solutions for application security.?
  • • Assess challenges in the secure software development life cycle (SDLC) process.?
  • • Select a threat model for securing software development.?
  • • Demonstrate cloud software assurance and validation.? ?
  • • Choose verified secure software.?
  • • Explain the specifics of cloud application architecture.?
  • • Appraise appropriate identity and access management (IAM) solutions.?
  • • Evaluate the design and plan for cloud infrastructure security controls.?
  • • Analyze what is used to manage and operate physical and logical infrastructure of a cloud environment.?
  • • Discuss operational controls and standards.?
  • • Identify methodologies for supporting digital forensics.? ?
  • • Identify critical communication needs with relevant parties.?
  • • Select requirements to implement secure operations.? ?
  • • Interpret guidelines for digital forensics.?
  • • Identify the fundamentals of data privacy regulatory/legislative mandates.?
  • • Summarize audit process, methodologies and cloud-ready adaptations.?
  • • Describe risk management related to cloud services.?
  • • Identify due care/diligence activities related to service contracts.?

ACE CREDIT

The Official (ISC)² CCSP CBK Training Seminar has earned ACE CREDIT. Students who complete the course can apply for 2 undergraduate credits at participating universities and colleges. (ISC)²’s CCSP training seminar is the only CCSP training available that provides college credits.