The (ISC)²® Certified Cloud Security Professional (CCSP) course is aimed at professionals looking to apply security measures in cloud-based environments. The certification is an industry-recognized credential that demonstrates to employers an individual’s knowledge of the technologies and processes involved in the secure development and deployment of cloud applications. The course teaches students the essential concepts and skills of cloud security and how to protect their data and code from the many threats present in today’s cloud-based environments. The comprehensive course covers topics such as cryptography, identity and access management, encryption, authentication, risk management, legal considerations, security monitoring and more.


* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Gain an advanced understanding of the application of cloud security principles, techniques and tools to secure cloud-based environments.
Master strategies to design, configure and deploy security controls in cloud environments, and how to monitor and auditing of cloud-based architecture.
Learn how to protect organizations against cyber threats and security breaches in accordance with applicable laws and regulations.
Learn best practices for responding to and resolving incidents related to cloud security.
Master security implications of various migrations and deployment models and strategies to secure the cloud.
Understand the application of cryptographic concepts and technologies in cloud platforms, as well as the impacts of different types of encryption on the cloud environment.
Review cloud data protection services and strategies for designing an effective cloud security architecture.
Understand the risk management process for cloud services and cloud-service providers, and understand the implications of data sovereigntyin in the cloud.
Learn the importance of identity, access and authentication management, and how to integrate these concepts into the cloud security architecture.
Gain hands-on experience configuring and deploying common cloud security tools.


  • Understand Cloud Computing Concepts

    Describe Cloud Reference Architecture

    Understand Security Concepts Relevant to Cloud Computing

    Understand Design Principles of Secure Cloud Computing

    Identify Trusted Cloud Services


  • Understand Cloud Data Lifecycle

    Design and Implement Cloud Data Storage Architectures

    Design and Apply Data Security Strategies

    Understand and Implement Data Discovery and Classification Technologies

    Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII)

    Design and Implement Data Rights Management

    Plan and Implement Data Retention, Deletion, and Archiving Policies

    Design and Implement Auditability, Traceability and Accountability of Data Events


  • Comprehend Cloud Infrastructure Components

    Analyze Risks Associated to Cloud Infrastructure

    Design and Plan Security Controls

    Plan Disaster Recovery and Business Continuity Management


  • Recognize the need for Training and Awareness in Application Security

    Understand Cloud Software Assurance and Validation

    Use Verified Secure Software

    Comprehend the Software Development Life-Cycle (SDLC) Process

    Apply the Secure Software Development Life-Cycle

    Comprehend the Specifics of Cloud Application Architecture

    Design Appropriate Identity and Access Management (IAM) Solutions


  • Implement and Build Physical Infrastructure for Cloud Environment

    Run Physical Infrastructure for Cloud Environment

    Manage Physical Infrastructure for Cloud Environment

    Logical Infrastructure for Cloud Environment

    Run Logical Infrastructure for Cloud Environment

    Manage Logical Infrastructure for Cloud Environment

    Ensure Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1)

    Conduct Risk Assessment to Logical and Physical Infrastructure

    Understand the Collection, Acquisition and Preservation of Digital Evidence

    Manage Communication with Relevant Parties


  • Understand Legal Requirements and Unique Risks within the Cloud Environment

    Understand Privacy Issues, Including Jurisdictional Variation

    Understand Audit Process, Methodologies, and Required Adaption's for a Cloud Environment

    Understand Implications of Cloud to Enterprise Risk Management

    Understand Outsourcing and Cloud Contract Design

    Execute Vendor Management


The CCSP course is designed for developers, systems administrators, security engineers, and other IT/security professionals who are responsible for cloud security operations, secure development, and secure deployment of cloud applications Strong knowledge of the cloud platform and its supporting infrastructure Familiarity with security terminology Experience with system and network security Experience in Cloud Database technologies such as Hadoop, MongoDB, Cassandra, etc. Previous experience in designing, implementing and securing cloud-deployed applications




Knowledge of cloud-specific security principles, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Service as a Service (SaaS) Understanding of AWS security concepts, such as Identity and Access Management (IAM), encryption, network access control and logging. Knowledge of network protocols, including TCP/IP, HTTP, DNS and SSL/TLS Experience with system and network monitoring and logging tools Understanding of data security and privacy principles and regulations, including GDPR and NIST standards Good communication skills.


Length: 5.0 days (40 hours)


Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.