The Certified Cloud Security Professional (CCSP®) provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam.
Official courseware is developed by (ISC)² – creator of the CCSP CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CCSP and have completed intensive training to teach (ISC)² content.
The Certified Cloud Security Professional (CCSP®) provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam.
Official courseware is developed by (ISC)² – creator of the CCSP CBK – to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the CCSP and have completed intensive training to teach (ISC)² content.
After completing this course, the student will be able to:
• Understand legal frameworks and guidelines that affect cloud services.
• Recognize the fundamentals of data privacy regulatory/legislative mandates.
• Assess risks, vulnerability, threats and attacks in the cloud environment.
• Evaluate the design and plan for cloud infrastructure security controls.
• Evaluate what is necessary to manage security operations.
• Understand what operational controls and standards to implement.
• Describe the types of cloud deployment models in the types of “as a service” cloud models currently available today.
• Identify key terminology and associated definitions related to cloud technology. Be able to establish a common terminology for use within a team or workgroup.
• Build a business case for cloud adoption and be able to determine with business units the benefits of the cloud and cloud migration strategies.
This course covers the following chapters and learning objectives:
After completing this course, the student will be able to:
• Understand legal frameworks and guidelines that affect cloud services.
• Recognize the fundamentals of data privacy regulatory/legislative mandates.
• Assess risks, vulnerability, threats and attacks in the cloud environment.
• Evaluate the design and plan for cloud infrastructure security controls.
• Evaluate what is necessary to manage security operations.
• Understand what operational controls and standards to implement.
• Describe the types of cloud deployment models in the types of “as a service” cloud models currently available today.
• Identify key terminology and associated definitions related to cloud technology. Be able to establish a common terminology for use within a team or workgroup.
• Build a business case for cloud adoption and be able to determine with business units the benefits of the cloud and cloud migration strategies.
This course covers the following chapters and learning objectives:
info@rhythexconsultingghana.com
No. 9 Samora Machel Road Asylum
Down, Accra – Ghana
Tel: +233 (0) 30 223 1305
info@rhythexconsulting.com
39A Sura Mogaji Street, Off Coker Road, Ilupeju, Lagos, Nigeria
Tel: +234 (0) 816 436 2696
info@rhythexconsulting.com
Plot 624, James Agwu Onoja Street,
Block 1, Flat 2, Wuye District, Abuja.
Tel: 08179444443, 08038553466