Cyber Security Cloud Computing Security Knowledge - CCSK

Cloud Computing Security Knowledge - CCSK

599.00 599.00
$599.00
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$
  • Course Delivery: On Demand
  • Duration: 9.25 
  • Language: English
  • Audience: Everyone, Science & Technology Professionals

Chat Live | Contact Us | Toll Free: (888) 360-8764

 

Description

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectual framework.
 

Course Objectives

  • Cloud Architecture
  • Governance and Enterprise Risk
  • Compliance and Audit Management
  • Data Center Operations
  • Encryption and Key Management.
 

Topics Covered

Module 1: Architecture

  • 1.0 Cloud Security Overview Part 1
  • 1.1 Cloud Security Overview Part 2
  • 1.2 Cloud Diagrams
  • 1.3 Cloud Services

Module 2: Governance and Enterprise Risk

  • 2.0 Risk Management
  • 2.1 Corporate Governance
  • 2.2 Enterprise Risk Management
  • 2.3 Risk Management Balance Process | Supply Chain Security
  • 2.4 ERM Incidents | Recommendations Part 1
  • 2.5 ERM Incidents | Recommendations Part 2
  • 2.6 ERM Incidents | Recommendations Part 3

Module 3: Legal Issues - Contracts and Electronic

  • 3.0 Cloud Legal Issues Part 1
  • 3.1 Cloud Legal Issues Part 2 - Possession, Contract Consideration
  • 3.2 Cloud Legal Issues Part 3 - Native Production

Module 4: Compliance and Audit Management

  • 4.0 Audits
  • 4.1 Compliance & Audit
  • 4.2 Audit Recommendations
  • 4.3 Audit Requirements

Module 5: Information Management and Data Security

  • 5.0 Information & Security
  • 5.1 Storage
  • 5.2 Information Governance | Classification
  • 5.3 Data Security
  • 5.4 Data Security Part 2 - Protecting Data Moving
  • 5.5 Client Database Encryption
  • 5.6 PaaS Encryption

Module 6: Interoperability and Portability

  • 6.0 Interoperability & Portability
  • 6.1 Interoperability Recommendations
  • 6.2 Portability Recommendations
  • 6.3 Recommendations SaaS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

  • 7.0 Business Conitnuity & Disaster Recovery
  • 7.1 Assessing CSP Security
  • 7.2 Equipment Maintenance
  • 7.3 Recommendations

Module 8: Data Center Operations

  • 8.0 Data Center Operations

Module 9: Incident Response

  • 9.0 Incident Response
  • 9.1 Testing
  • 9.2 IaaS
  • 9.3 C.E.R. = Containment, Eradication, & Recovery

Module 10: Application Security

  • 10.0 Application Security
  • 10.1 Security Testing
  • 10.2 Audit Compliance
  • 10.3 Security Assurance Recommendations

Module 11: Encryption and Key Management

  • 11.0 Encryption & Key Management
  • 11.1 Content Aware Encryption
  • 11.2 Storage of Keys

Module 12: Identity, Entitlement, and Access Management

  • 12.0 Building Access Control
  • 12.1 Intro to Identity
  • 12.2 Entitlement Process
  • 12.3 Trust with Identity
  • 12.4 Recommendations for Identity Management

Module 13: Virtualization

  • 13.0 Virtualization
  • 13.1 Hypervisor & Virtual Machine
  • 13.2 Inter-Virtual Machine Attacks
  • 13.3 Virtual Machine Encryption
  • 13.4 Virtual Machine Recommendations & Requirements

Module 14: Security as a Service

  • 14.0 Security as a Service (SaaS)
  • 14.1 Implementing Advantages
  • 14.2 Security Offerings
  • 14.3 Intrusion Detection | Prevention
  • 14.4 Business Continuity & Disaster Recovery
  • 14.5 European CCSK
  • 14.6 Top Security Benefits
  • 14.7 European Legal Based Issues

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.