Certified Cloud Security Professional (CCSP)

By Tia Williams

A Certified Cloud Security Professional demonstrates they’re on the forefront of cloud security. Develop skills needed for the CCSP certification and securing critical assets in the cloud.

22 hours
  • 132 Lessons
  • 7 Hands-On Labs
  • 1 Practice Exam

About the course

The Certified Cloud Security Professional (CCSP) certification ensures cloud security professionals have the necessary knowledge and skills in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. This course is designed to prepare you for the CCSP exam, as well as provide you with the skills you need to succeed as a security professional.
https://interactive.linuxacademy.com/diagrams/CCSP.html

  • Chapter 1 4 Lessons Getting Started 5:12

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    About the Author

    1:11

    About the Course

    1:23

    Course Prerequisites

    1:19
  • Chapter 2 1 Lesson Cloud Computing Concepts 9:56

    Roles, Characteristics and Building Block Technologies

    9:56
  • Chapter 3 8 Lessons Cloud Reference Architecture 2:11:31

    Cloud Computing Activities and Service Categories

    15:59

    Cloud Deployment Models

    8:51

    Cloud Shared Considerations

    7:01

    Impact of Related Technologies

    8:08

    Lab Preparation Video (Important)

    1:32

    Access and Tour the AWS Console

    30:00 Hands-On Lab

    Introduction to EC2

    30:00 Hands-On Lab

    Create a Windows EC2 Instance and Connect using Remote Desktop Protocol (RDP)

    30:00 Hands-On Lab
  • Chapter 4 6 Lessons Cloud Security Concepts 1:24:25

    Cryptography and Key Management

    8:00

    Data and Media Sanitization

    3:19

    Access Control

    6:12

    Network Security and Virtualization Security

    8:49

    Common Threats

    13:05

    Introduction to AWS Identity and Access Management (IAM)

    45:00 Hands-On Lab
  • Chapter 5 5 Lessons Design Principles 30:19

    Secure Cloud Data Lifecycle

    4:34

    Cloud-Based Disaster Recovery (DR) and Business Continuity (BC)

    9:33

    Cost-Benefit Analysis

    6:24

    Functional Security Requirements

    4:01

    Security Considerations for Different Cloud Categories

    5:47
  • Chapter 6 2 Lessons Evaluate Cloud Service Providers 18:22

    Verification Against Criteria

    13:05

    System and Subsystem Product Certifications

    5:17
  • Chapter 7 2 Lessons Describe Cloud Data Concepts 11:26

    Cloud Data Lifecycle Phases

    6:39

    Data Dispersion

    4:47
  • Chapter 8 3 Lessons Design and Implement Cloud Data Storage Architecture 42:18

    Storage Types

    4:55

    Threats to Storage Types

    7:23

    Creating Amazon S3 Buckets, Managing Objects, and Enabling Versioning

    30:00 Hands-On Lab
  • Chapter 9 5 Lessons Design and Apply Data Security Technologies and Strategies 34:13

    Encryption and Key Management

    13:33

    Hashing, Masking, and Obfuscation

    5:00

    Tokenization

    4:16

    Data Loss Prevention (DLP)

    8:02

    Data De-identification

    3:22
  • Chapter 10 2 Lessons Implement Data Discovery and Classification 9:10

    Structured and Unstructured Data

    5:15

    Mapping, Labeling, and Sensitive Data

    3:55
  • Chapter 11 1 Lesson Design and Implement Information Rights Management 8:40

    IRM Objectives and Tools

    8:40
  • Chapter 12 5 Lessons Plan and Implement Data Retention, Deletion, and Archival Policies 47:23

    Data Retention Policies

    5:07

    Data Deletion Procedures and Mechanisms

    3:40

    Data Archival Procedures and Mechanisms

    6:12

    Legal Hold

    2:24

    Creating a Basic Amazon S3 Lifecycle Policy

    30:00 Hands-On Lab
  • Chapter 13 3 Lessons Design and Implement Auditability, Traceability, and Accountability of Data Events 19:14

    Definition of Event Sources and Requirements

    8:15

    Logging, Storage, and Analysis of Data Events

    6:42

    Chain of Custody and Non-Repudiation

    4:17
  • Chapter 14 4 Lessons Cloud Infrastructure Components 30:23

    Physical Environment

    7:20

    Network and Communications

    5:17

    Compute and Virtualization

    9:47

    Storage and Management Plane

    7:59
  • Chapter 15 3 Lessons Design a Secure Datacenter 33:51

    Logical Design

    10:11

    Physical Design

    9:17

    Environmental Design

    14:23
  • Chapter 16 3 Lessons Analyze Risks Associated with Cloud Infrastructure 19:40

    Risk Assessment and Analysis

    8:16

    Cloud Vulnerabilities, Risks, Threats, and Attacks

    6:08

    Countermeasure Strategies

    5:16
  • Chapter 17 4 Lessons Design and Plan Security Controls 20:37

    Physical and Environmental Protection

    3:46

    System and Communication Protection

    6:53

    Identification, Authentication, and Authorization in Cloud Infrastructure

    4:13

    Audit Mechanisms

    5:45
  • Chapter 18 5 Lessons Plan Disaster Recovery (DR) and Business Continuity (BC) 45:12

    Risks Related to the Cloud Environment

    7:34

    Business Requirements

    6:20

    Business Continuity/Disaster Recovery Strategy

    5:31

    Creating a BCDR Plan

    14:29

    Testing a BCDR Plan

    11:18
  • Chapter 19 2 Lessons Advocate Training and Awareness for Application Security 7:23

    Cloud Development Basics

    3:30

    Common Pitfalls and Vulnerabilities

    3:53
  • Chapter 20 1 Lesson Describe the Secure Software Development Life Cycle (SDLC) Process 11:04

    Business Requirements and Phases/Methodologies

    11:04
  • Chapter 21 3 Lessons Apply the Secure Software Development Life Cycle (SDLC) 16:56

    Avoid Common Vulnerabilities During Development

    6:25

    Cloud-Specific Risks and Quality Assurance

    5:28

    Threat Modeling and Configuration Management

    5:03
  • Chapter 22 1 Lesson Apply Cloud Software Assurance and Validation 7:59

    Functional Testing and Security Testing Methodologies

    7:59
  • Chapter 23 1 Lesson Use Verified Secure Software 4:41

    Approved APIs and Third-Party Software

    4:41
  • Chapter 24 4 Lessons Comprehend the Specifics of Cloud Application Architecture 1:14:09

    Supplemental Security Components

    3:55

    Cryptography

    6:59

    Sandboxing and Application Virtualization

    3:15

    AWS Security Essentials - KMS Integration with S3

    1:00:00 Hands-On Lab
  • Chapter 25 3 Lessons Design Appropriate Identity and Access Management (IAM) Solutions 12:11

    Federated Identity and Identity Providers

    3:47

    Single Sign-On (SSO) and Multi-Factor Authentication (MFA)

    5:07

    Cloud Access Security Broker (CASB)

    3:17
  • Chapter 26 2 Lessons Implement and Build Physical and Logical Infrastructure for a Cloud Environment 8:41

    Hardware-Specific Security Configuration Requirements

    3:16

    Virtualization Management Toolsets

    5:25
  • Chapter 27 5 Lessons Operate Physical and Logical Infrastructure for the Cloud Environment 32:46

    Configure Access Control for Local and Remote Access

    6:32

    Secure Network Configuration

    9:39

    Operating System (OS) Hardening through the Application of Baselines

    3:58

    Stand-Alone Hosts

    3:51

    Availability of Clustered Hosts and Guest OSs

    8:46
  • Chapter 28 5 Lessons Manage Physical and Logical Infrastructure for the Cloud Environment 32:19

    Access Controls for Remote Access

    4:13

    Patch Management

    11:25

    Performance, Capacity, and Hardware Monitoring

    4:24

    Backup and Restore Functions

    4:39

    Network Security Controls and Management Plane

    7:38
  • Chapter 29 4 Lessons Implement Operational Controls and Standards 19:57

    Change and Continuity Management

    6:50

    Information Security and Incident Management

    3:21

    Problem and Deployment Management

    3:31

    Additional Operational Management

    6:15
  • Chapter 30 2 Lessons Support Digital Forensics 14:40

    Forensic Data Collection Methodologies

    12:12

    Evidence Management

    2:28
  • Chapter 31 1 Lesson Manage Communication with Relevant Parties 6:42

    Managing Communications

    6:42
  • Chapter 32 3 Lessons Manage Security Operations 13:03

    Security Operations Center (SOC) and Monitoring Security Controls

    3:34

    Log Capture and Analysis

    3:55

    Incident Management

    5:34
  • Chapter 33 5 Lessons Articulate Legal Requirements and Unique Risks with the Cloud Environment 25:42

    Conflicting International Legislation

    4:36

    Legal Risks Specific to Cloud Computing

    1:47

    Legal Frameworks and Guidelines

    13:18

    eDiscovery

    3:32

    Forensics Requirements

    2:29
  • Chapter 34 3 Lessons Understand Privacy Issues 18:36

    Contractual vs. Regulated Private Data

    5:08

    Country-Specific Legislation Related to Private Data

    8:29

    Jurisdictional Differences and Standard Privacy Requirements

    4:59
  • Chapter 35 9 Lessons Understand Audit Processes, Methodologies, and Required Adaptations for a Cloud Environment 40:40

    Audit Controls and Requirements

    5:18

    Assurance Challenges of Virtualization and Cloud

    3:56

    Types of Audit Reports

    5:01

    Restrictions of Audit Scope Statements

    4:47

    Gap Analysis and Audit Planning

    5:16

    Internal Security Management System (ISMS)

    3:58

    Policies and Involvement of Relevant Stakeholders

    7:01

    Specialized Compliance Requirements for Highly Regulated Industries

    2:16

    Impact of Distributed Information Technology (IT) Model

    3:07
  • Chapter 36 6 Lessons Understand the Implications of Cloud-to-Enterprise Risk Management 24:35

    Assess Providers' Risk Management Programs

    5:36

    Data Owner/Controller vs. Data Custodian/Processor

    2:38

    Regulatory Transparency Requirements

    2:06

    Risk Treatment and Frameworks

    6:56

    Metrics for Risk Management

    4:13

    Assessment of Risk Environment

    3:06
  • Chapter 37 4 Lessons Understand Outsourcing and Cloud Contract Design 16:12

    Business Requirements

    3:10

    Vendor Management

    5:43

    Contract Management

    3:48

    Supply Chain Management

    3:31
  • Chapter 38 3 Lessons Next Steps 3:04:53

    How to Prepare for the Exam

    3:02

    What's Next After Certification

    1:51

    CCSP

    3:00:00 Quiz

What you will need

  • Five years of experience in IT, three of which should be in the information security field.2. One year in one or more of the six domains of the CCSP CBK.

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!