Cloud Computing Security Knowledge (CCSK) Training Pack

$179.00

Share The Knowledge


Description

The Express Training Pack or EPT,  is a product designed to gain maximum knowledge in an efficient period of time. Each program contains lecture videos that emulate the content discussed in a live classroom environment. As you progress through each module, you will be challenged to a series of practice questions. In order to move on you must complete each rigorous quiz. Upon completion of all modules, you will gain access to a final practice exam, prepared by the instructor, to test your overall knowledge and mastery of the course.When you are steadily scoring 90 or above, you have achieved mastery and are ready to pass your exam.

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework.

This course is led by Dean Bushmiller

This Course Will Help You:

  • Validate your competence gained through experience in cloud security
  • Demonstrate your technical knowledge, skills, and abilities to effectively develop a holistic cloud security program relative to globally accepted standards
  • Differentiate yourself from other candidates for desirable employment in the fast-growing cloud security market
  • Gain access to valuable career resources, such as tools, networking and ideas exchange with peers

This Course Contains:

  • A 10 hour lecture series that emulates a live classroom session.
  • 100 Practice Questions designed to ready you for the live certification exam.
  • Student Forums, where you can share ideas and feedback with our learning community.
  • Instructor Support.
  • Our ITU Pass Guarantee

Outline

Module 1: Architecture

1.0 Cloud Security Overview Part 1

1.1 Cloud Security Overview Part 2

1.2 Cloud Diagrams

1.3 Cloud Services

Module 2: Governance and Enterprise Risk

2.0 Risk Management

2.1 Corporate Governance

2.2 Enterprise Risk Management

2.3 Risk Management Balance Process | Supply Chain Security

2.4 ERM Incidents | Recommendations Part 1

2.5 ERM Incidents | Recommendations Part 2

2.6 ERM Incidents | Recommendations Part 3

Module 3: Legal Issues – Contracts and Electronic

3.0 Cloud Legal Issues Part 1

3.1 Cloud Legal Issues Part 2 – Possession, Contract Consideration

3.2 Cloud Legal Issues Part 3 – Native Production

Module 4: Compliance and Audit Management

4.0 Audits

4.1 Compliance & Audit

4.2 Audit Recommendations

4.3 Audit Requirements

Module 5: Information Management and Data Security

5.0 Information & Security

5.1 Storage

5.2 Information Governance | Classification

5.3 Data Security

5.4 Data Security Part 2 – Protecting Data Moving

5.5 Client Database Encryption

5.6 PaaS Encryption

Module 6: Interoperability and Portability

6.0 Interoperability & Portability

6.1 Interoperability Recommendations

6.2 Portability Recommendations

6.3 Recommendations SaaS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

7.0 Business Conitnuity & Disaster Recovery

7.1 Assessing CSP Security

7.2 Equipment Maintenance

7.3 Recommendations

Module 8: Data Center Operations

8.0 Data Center Operations

Module 9: Incident Response

9.0 Incident Response

9.1 Testing

9.2 IaaS

9.3 C.E.R. = Containment, Eradication, & Recovery

Module 10: Application Security

10.0 Application Security

10.1 Security Testing

10.2 Audit Compliance

10.3 Security Assurance Recommendations

Module 11: Encryption and Key Management

11.0 Encryption & Key Management

11.1 Content Aware Encryption

11.2 Storage of Keys

Module 12: Identity, Entitlement, and Access Management

12.0 Building Access Control

12.1 Intro to Identity

12.2 Entitlement Process

12.3 Trust with Identity

12.4 Recommendations for Identity Management

Module 13: Virtualization

13.0 Virtualization

13.1 Hypervisor & Virtual Machine

13.2 Inter-Virtual Machine Attacks

13.3 Virtual Machine Encryption

13.4 Virtual Machine Recommendations & Requirements

Module 14: Security as a Service

14.0 Security as a Service (SaaS)

14.1 Implementing Advantages

14.2 Security Offerings

14.3 Intrusion Detection | Prevention

14.4 Business Continuity & Disaster Recovery

14.5 European CCSK

14.6 Top Security Benefits

14.7 European Legal Based Issues