Certificate of Cloud Security Knowledge (CCSK & CCSK Plus)

Paths

Certificate of Cloud Security Knowledge (CCSK & CCSK Plus)

Author: Lyron Andrews

This series provides the foundational knowledge needed to utilize cloud services more securely and speak with confidence about cloud security concerns. The Certificate of Cloud... Read more

What you will learn:

  • Detail governance and enterprise risk management within the cloud
  • Detail compliance and audit management in the cloud
  • Explain how hosting data in the cloud affects information governance
  • Examine the management plane and business continuity within the cloud
  • Employ infrastructure security
  • Detail incident response in the cloud
  • Detail application security in the cloud
  • Employ data security and encryption
  • Employ identity, entitlement, and access management
  • Examine security as a service

Pre-requisites

There is no official work experience required, however, it is helpful for learners to have a basic understanding of security fundamentals such as firewalls, secure development, encryption, and identity and access management.

Certificate of Cloud Security Knowledge (CCSK & CCSK Plus)

This series provides the foundational knowledge needed to utilize cloud services more securely and speak with confidence about cloud security concerns. The Certificate of Cloud Security Knowledge, enables you to gain critical insights into topics such as data security, key management, and identity and access management.

Introduction to Information Security within Cloud Computing

by Lyron Andrews

Jun 4, 2020 / 1h 20m

1h 20m

Start Course
Description

With an expanding array of cloud services being offered daily it is easy for the inexperienced to lack awareness of security functions in cloud offerings. In this course, Introduction to Information Security within Cloud Computing, you’ll learn to identify and select secure cloud services based upon business requirements. First, you’ll explore the detailed definition of cloud computing. Next, you’ll discover the deployment and service models of cloud computing. Finally, you’ll learn how to use a matrix to review the controls enacted by a cloud provider. When you’re finished with this course, you’ll have the skills and knowledge of, Introduction to Information Security within Cloud Computing needed to select secure cloud services that meet business requirements.

Table of contents
  1. Course Overview
  2. Defining Cloud Computing and Essential Characteristics
  3. Understanding Cloud Deployment and Service Models
  4. Establishing a Secure Cloud Architecture

Implement Infrastructure Security for Cloud

by Lyron Andrews

Jun 11, 2020 / 1h 16m

1h 16m

Start Course
Description

Gartner predicts that through 2022, insufficient cloud IaaS skills will delay half of enterprise IT organizations’ migration to the cloud by two years or more. In this course, Implement Infrastructure Security for Cloud, you’ll learn to apply the awareness and the controls to protect the cloud infrastructure. First, you’ll explore infrastructure security. Next, you’ll discover how to implement least privilege. Finally, you’ll learn how to identify controls for virtualization security. When you’re finished with this course, you’ll have the skills and knowledge of Implementing Infrastructure Security for Cloud needed to protect the cloud infrastructure.

Table of contents
  1. Course Overview
  2. Explaining Virtualization and Containers
  3. Protecting the Management Plane and Establishing BCDR in the Cloud
  4. Employing Infrastructure Security

Manage Cloud Security and Risk

by Lyron Andrews

Jun 18, 2020 / 1h 24m

1h 24m

Start Course
Description

The cloud security alliance publishes a list of top threats to cloud computing that follows an alliterative word and number match. The lists are helpful to inform best practices to protect your cloud assets and services. In this course, Manage Cloud Security and Risk, you’ll learn to the important elements of managing these risks. First, you’ll explore how to maintain compliance and audit in the cloud. Next, you’ll discover how to establish governance and risk management in the cloud. Finally, you’ll learn how to examine legal, contract, and e-discover issues as related to using the cloud. When you’re finished with this course, you’ll have the skills and knowledge of Managing Cloud Security and Risk needed to reduce risks to an acceptable degree to the business.

Table of contents
  1. Course Overview
  2. Understanding Governance and Enterprise Risk Management in the Cloud
  3. Maintaining Compliance and Audit Management in the Cloud
  4. Compiling Legal Issues, Contract, and Electronic Discovery

Maintain Data Security in the Cloud

by Lyron Andrews

Jul 30, 2020 / 1h 3m

1h 3m

Start Course
Description

IBM estimates that everyday, humanity creates 2.5 quintillion bytes (that is 2.5 followed by18 zeros) of data–This means that 90% of the data in the world today has been created in the last two years alone. In the cloud, data is often unintentionally made accessible to the unauthorized. In this course, Maintain Data Security in the Cloud, you’ll learn to protect your cloud data from unauthorized access. First, you’ll explore and plan your secure deployment path to the cloud. Next, you’ll discover what kind of data security and encryption is utilized for particular types of cloud services. Finally, you’ll log into the AWS management console and learn how to implement controls for workload protection. When you’re finished with this course, you’ll have the skills and knowledge of Maintaining Data Security in the Cloud needed to protect your cloud data from unauthorized access.

Table of contents
  1. Course Overview
  2. Planning Data Security in the Cloud
  3. Employing Data Security and Encryption
  4. Implementing Protection Controls for Workloads

Secure Cloud Applications, Users, and Related Technologies

by Lyron Andrews

Aug 6, 2020 / 1h 5m

1h 5m

Start Course
Description

In the next year and beyond, many companies plan to move almost all of their applications to the cloud, while some larger corporations have already moved one hundred percent of their applications to the cloud! Protecting valuable assets within the distributed nature of the cloud then presents a challenge. In this course, Secure Cloud Applications, Users, and Related Technologies, you’ll learn to apply frameworks for securing cloud applications, users, and other assets. First, you’ll explore application security in the cloud. Next, you’ll discover how to employ IAM tools to manage least privilege access for users. Finally, you’ll learn how to categorize and protect related technologies. When you’re finished with this course, you’ll have the skills and knowledge of Secure Cloud Applications, Users, and Related Technologies needed to protect your distributed cloud assets.

Table of contents
  1. Course Overview
  2. Managing Application Security in the Cloud
  3. Employing Identity, Entitlement, and Access Management
  4. Reviewing Related Technologies

Perform Cloud Security Operations

by Lyron Andrews

Aug 11, 2020 / 48m

48m

Start Course
Description

Incidents in the cloud can be devastating for an organization's ability to thrive or survive. In this course, Perform Cloud Security Operations, you’ll learn to implement tools to use to monitor and manage through incidents. First, you’ll explore how to prepare for incident response in the cloud. Next, you’ll configure monitoring and logging in the cloud. Finally, you’ll learn how to select from SecaaS providers. When you’re finished with this course, you’ll have the skills and knowledge of Performing Cloud Security Operations needed to monitor and manage through incidents in the cloud.

Table of contents
  1. Course Overview
  2. Preparing for Incident Response in the Cloud
  3. Managing Logging in the Cloud
  4. Choosing from SECaaS Offerings