CCSK OVERVIEW
The CCSK course is two days of high-impact accelerated classroom training with practical labs on how to secure and audit Amazon/Azure cloud services, including Core Account Security, IAM, Monitoring In-Depth, Network and Instance Security, Encryption, and Storage Security, Application and Security Federation, and Risk and Provider Assessment.
Roles Supported and Learning Objectives:
The CCSK Plus course includes all the content of the CCSK Foundation course and adds expanded lecture material and extensive hands-on lab activities, which are integrated with the CCSK Foundation lecture modules as appropriate. Students will learn to apply CCSK Foundation knowledge by performing a series of exercises that are part of a scenario that brings a fictional organization securely into the cloud. Although CCSK Plus training includes some additional lecture content, students will spend most of their time assessing, building, and securing a cloud infrastructure during the exercises. Those seeking to secure the CCSK have already attained or are seeking to achieve the following positions: Cloud Security Auditor, Director, Information Security, Cloud Engineer, Cloud Security Architect, Information Security Analyst, and Security Assurance Operations Analyst.
Exam token (2 exam attempts).
The CCSK can be used to satisfy 14 continuing professional education credits for several other IT credentials.
Digital copies of all training materials. (PDF of 152-page Security Guidance, 162-page Lab Handbook, and 124-page Student Handbook)
Current course bookings are for online training events unless specified otherwise. All materials and video conference information will be sent to the registration email that you use.
Domains Covered:
1. Cloud Computing Concepts
2. Governance & Enterprise Risk Management
3. Legal Issues: Contracts and Electronic Discovery
4. Compliance & Audit Management
5. Information Governance
6. Management Plane & Business Continuity
7. Infrastructure Security
8. Virtualization & Containers
9. Incident Response
10. Application Security
11. Data Security & Encryption
12. Identity Entitlement and Access Management
13. Security as a Service
14. Related Technologies
15. CCM
16. ENISA