Cloud Computing Security Knowledge CCSK

4.5
2 reviews
  • This course has been a great opportunity for myself to step into the field of psychology and provided me with the most relevant information at entry level.I found this program as very convenient and flexible to my own circumstances and felt that I would always receive a quick response and support from the tutor when needed.
    |
  • Very interesting course and relevant to my job.I could complete the course at my own pace. Had very good constructive feedback from the tutor.
    |

Course

Online

£ 180 VAT inc.

Call the centre

Description

  • Type

    Course

  • Methodology

    Online

  • Duration

    Flexible

A distance learning course is the ideal way to gain a Cloud Computing Security Knowledge CCSK Certification. Whether you're looking to go on to further education, improve your job prospects or expand your knowledge, distance learning Cloud Computing Security Knowledge CCSK Course is a flexible and convenient course, which allows you to comprehensively prepare for the Cloud Computing Security Knowledge CCSK Certification exam through home study. What's more, because the distance learning Cloud Computing Security Knowledge CCSK is a fully comprehensive course, no prior knowledge is required.

This course provides students thorough coverage of cloud security fundamentals. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery.

Important information

Price for Emagister users: We are offering a 20% discount this month for all enrolments that are paid in full and made online.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now closed

About this course


Key Topics

The CCSK Course is divided into following lessions:

Architecture
Governance and Enterprise Risk
Legal Issues- Contracts and Electronic
Compliance and Audit Management
Information Management and Data Security
Interoperability and Portability
Traditional Security, Business Continuity, and Disaster Recovery
Data Center Operations
Incident Response
Application Security
Encryption and Key Management
Identity, Entitlement, and Access Management
Virtualization
Security as a Service

No Entry Requirements

While there are no official prerequisites for the CCSK exam, both CSA and eDistanceLearning strongly recommend attendees have at least a basic understanding of security fundamentals, such as firewalls, secure development, encryption, and identity management.

This Cloud Computing Security Knowledge course will prepare you for following certification:

Cloud Security Alliance CCSK certification

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

4.5
  • This course has been a great opportunity for myself to step into the field of psychology and provided me with the most relevant information at entry level.I found this program as very convenient and flexible to my own circumstances and felt that I would always receive a quick response and support from the tutor when needed.
    |
  • Very interesting course and relevant to my job.I could complete the course at my own pace. Had very good constructive feedback from the tutor.
    |
100%
4.6
excellent

Course rating

Recommended

Centre rating

Melanie

4.0
29/04/2015
What I would highlight: This course has been a great opportunity for myself to step into the field of psychology and provided me with the most relevant information at entry level.I found this program as very convenient and flexible to my own circumstances and felt that I would always receive a quick response and support from the tutor when needed.
Would you recommend this course?: Yes

Ishaan

5.0
15/04/2015
What I would highlight: Very interesting course and relevant to my job.I could complete the course at my own pace. Had very good constructive feedback from the tutor.
What could be improved: Nothing
Would you recommend this course?: Yes
*All reviews collected by Emagister & iAgora have been verified

This centre's achievements

2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 16 years

Subjects

  • IT Management
  • IT risk
  • Database
  • Network security
  • IT Security
  • Computing
  • IT
  • Cloud computing

Teachers and trainers (1)

Support Advisor

Support Advisor

Support Advisor

Course programme

Course OutlineHow is the Course Structured?

Lesson 1: Architecture

  • NIST Definitions
  • Essential Characteristics
  • Service Models
  • Deployment Models
  • Multi-Tenancy
  • CSA Cloud Reference Model
  • Jericho Cloud Cube Model
  • Cloud Security Reference Model
  • Cloud Service Brokers
  • Service Level Agreements

Lesson 2: Governance and Enterprise Risk Management

  • Contractual Security Requirements
  • Enterprise and Information Risk Management
  • Third Party Management Recommendations
  • Supply chain examination
  • Use of Cost Savings for Cloud

Lesson 3: Legal Issues: Contracts and Electronic Discovery

  • Consideration of cloud-related issues in three dimensions
  • eDiscovery considerations
  • Jurisdictions and data locations
  • Liability for activities of subcontractors
  • Due diligence responsibility
  • Federal Rules of Civil Procedure and electronically stored information
  • Metadata
  • Litigation hold

Lesson 4: Compliance and Audit Management

  • Definition of Compliance
  • Right to audit
  • Compliance impact on cloud contracts
  • Audit scope and compliance scope
  • Compliance analysis requirements
  • Auditor requirements

Lesson 5: Information Management and Data Security

  • Six phases of the Data Security Lifecycle and their key elements
  • Volume storage
  • Object storage
  • Logical vs physical locations of data
  • Three valid options for protecting data
  • Data Loss Prevention
  • Detection Data Migration to the Cloud
  • Encryption in IaaS, PaaS & SaaS
  • Database Activity Monitoring and File Activity Monitoring
  • Data Backup
  • Data Dispersion
  • Data Fragmentation

Lesson 6: Interoperability and Portability

  • Definitions of Portability and Interoperability
  • Virtualization impacts on Portability and Interoperability
  • SAML and WS-Security
  • Size of Data Sets
  • Lock-In considerations by IaaS, PaaS & SaaS delivery models
  • Mitigating hardware compatibility issues

Lesson 7: Traditional Security, Business Continuity, and Disaster Recovery

  • Four D’s of perimeter security
  • Cloud backup and disaster recovery services
  • Customer due diligence related to BCM/DR
  • Business Continuity Management/Disaster Recovery due diligence
  • Restoration Plan
  • Physical location of cloud provider

Lesson 8: Data Center Operations

  • Relation to Cloud Controls Matrix
  • Queries run by data center operators
  • Technical aspects of a Provider’s data center operations for customers
  • Logging and report generation in multi-site clouds

Lesson 9: Incident Response

  • Factor allowing for more efficient and effective containment and recovery in a cloud
  • Main data source for detection and analysis of an incident
  • Investigating and containing an incident in an Infrastructure as a Service environment
  • Reducing the occurrence of application level incidents
  • How often should incident response testing occur
  • Offline analysis of potential incidents

Lesson 10: Application Security

  • Identity, entitlement, and access management (IdEA)
  • SDLC impact and implications
  • Differences in S-P-I models
  • Consideration when performing a remote vulnerability test of a cloud-based application
  • Categories of security monitoring for applications
  • Entitlement matrix

Lesson 11: Encryption and Key Management

  • Adequate encryption protection of data in the cloud
  • Key management best practices, location of keys, keys per user
  • Relationship to tokenization, masking, anonymization and cloud database controls

Lesson 12: Identity, Entitlement, and Access Management

  • Relationship between identities and attributes
  • Identity Federation
  • Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP)
  • SAML and WS-Federation
  • Provisioning and authoritative sources

Lesson 13: Virtualization

  • Security concerns for hypervisor architecture
  • VM guest hardening, blind spots, VM Sprawl, data comingling, instant-on gaps
  • In-Motion VM characteristics that can create a serious complexity for audits
  • How can virtual machine communications bypass network security controls
  • VM attack surfaces
  • Compartmentalization of VMs

Lesson 14: Security as a Service

  • Barriers to developing full confidence in security as a service (SECaaS)
  • Deployment of Security as a Service in a regulated industry prior SLA
  • Logging and reporting implications
  • How can web security as a service be deployed
  • What measures do Security as a Service providers take to earn the trust of their customers
  • ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security
  • Isolation failure
  • Economic Denial of Service
  • Licensing Risks
  • VM hopping
  • Five key legal issues common across all scenarios
  • Top security risks in ENISA research
  • OVF
  • Underlying vulnerability in Loss of Governance
  • User provisioning vulnerability
  • Risk concerns of a cloud provider being acquired
  • Security benefits of cloud
  • Risks
  • Data controller vs data processor definitions in Infrastructure as a Service (IaaS), who is responsible for guest systems monitor

Call the centre

Cloud Computing Security Knowledge CCSK

£ 180 VAT inc.