Course name:
Cloud Computing Security Knowledge (CCSK)
Description:
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam.
Duration:
40 Hours
Audience:
Information Security Professionals
Prerequisites:
Cloud Computing
Course outline:
<p class="MsoNormal">The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework&nbsp;&nbsp;</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Learning Objective</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">&nbsp;</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Outline</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 1: Architecture</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 2: Governance and Enterprise Risk</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 3: Legal Issues- Contracts and Electronic</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 4: Compliance and Audit Management</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 5: Information Management and Data Security</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 6: Interoperability and Portability</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 7: Traditional Security, Business Continuity and Disaster Recovery</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 8: Data Center Operations</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 9: Incident Response</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 10: Application Security</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 11: Encryption and Key Management</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 12: Identity, Entitlement and Access Management</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">Module 13: Virtualization</p> <p>Module 14: Security as a Service</p> <p class="MsoNormal" style="margin-bottom: .0001pt;">&nbsp;</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.