The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam.
Duration:
40 Hours
Audience:
Information Security Professionals
Prerequisites:
Cloud Computing
Course outline:
<p class="MsoNormal">The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework </p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Learning Objective</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectural framework</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;"> </p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Outline</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 1: Architecture</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 2: Governance and Enterprise Risk</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 3: Legal Issues- Contracts and Electronic</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 4: Compliance and Audit Management</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 5: Information Management and Data Security</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 6: Interoperability and Portability</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 7: Traditional Security, Business Continuity and Disaster Recovery</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 8: Data Center Operations</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 9: Incident Response</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 10: Application Security</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 11: Encryption and Key Management</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 12: Identity, Entitlement and Access Management</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;">Module 13: Virtualization</p>
<p>Module 14: Security as a Service</p>
<p class="MsoNormal" style="margin-bottom: .0001pt;"> </p>