CCSK Online Courses

CCSK Online Courses in South Africa

 

This 2KO CSA Certificate of Cloud Technology Security Knowledge (CCSK) course provides students with the knowledge and skills that are needed for CSA Certificate of Cloud Technology Security Knowledge (CCSK) certification. 2KO International delivers computer courses from beginner level to advanced, and is also a leading supplier of of online IT training courses from the comfort of home or work.

 

The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery. Upon course completion, students will be prepared for the CCSK Exam, and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity, resiliency and measured usage, and understand the cloud computing architectual framework.

 

Course Outline

Introduction
 

Module 1: Architecture

1.0 Cloud Security Overview Part 1

1.1 Cloud Security Overview Part 2

1.2 Cloud Diagrams

1.3 Cloud Services

 

Module 2: Governance and Enterprise Risk

2.0 Risk Management

2.1 Corporate Governance

2.2 Enterprise Risk Management

2.3 Risk Management Balance Process | Supply Chain Security

2.4 ERM Incidents | Recommendations Part 1

2.5 ERM Incidents | Recommendations Part 2

2.6 ERM Incidents | Recommendations Part 3

 

Module 3: Legal Issues - Contracts and Electronic

3.0 Cloud Legal Issues Part 1

3.1 Cloud Legal Issues Part 2 - Possession, Contract Consideration

3.2 Cloud Legal Issues Part 3 - Native Production

 

Module 4: Compliance and Audit Management

4.0 Audits

4.1 Compliance & Audit

4.2 Audit Recommendations

4.3 Audit Requirements

 

Module 5: Information Management and Data Security

5.0 Information & Security

5.1 Storage

5.2 Information Governance | Classification

5.3 Data Security

5.4 Data Security Part 2 - Protecting Data Moving

5.5 Client Database Encryption

5.6 PaaS Encryption

 

Module 6: Interoperability and Portability

6.0 Interoperability & Portability

6.1 Interoperability Recommendations

6.2 Portability Recommendations

6.3 Recommendations SaaS

 

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

7.0 Business Conitnuity & Disaster Recovery

7.1 Assessing CSP Security

7.2 Equipment Maintenance

7.3 Recommendations

 

Module 8: Data Center Operations

8.0 Data Center Operations

 

Module 9: Incident Response

9.0 Incident Response

9.1 Testing

9.2 IaaS

9.3 C.E.R. = Containment, Eradication, & Recovery

 

Module 10: Application Security

10.0 Application Security

10.1 Security Testing

10.2 Audit Compliance

10.3 Security Assurance Recommendations

 

Module 11: Encryption and Key Management

11.0 Encryption & Key Management

11.1 Content Aware Encryption

11.2 Storage of Keys

 

Module 12: Identity, Entitlement, and Access Management

12.0 Building Access Control

12.1 Intro to Identity

12.2 Entitlement Process

12.3 Trust with Identity

12.4 Recommendations for Identity Management

 

Module 13: Virtualization

13.0 Virtualization

13.1 Hypervisor & Virtual Machine

13.2 Inter-Virtual Machine Attacks

13.3 Virtual Machine Encryption

13.4 Virtual Machine Recommendations & Requirements

 

Module 14: Security as a Service

14.0 Security as a Service (SaaS)

14.1 Implementing Advantages

14.2 Security Offerings

14.3 Intrusion Detection | Prevention

14.4 Business Continuity & Disaster Recovery

14.5 European CCSK

14.6 Top Security Benefits

14.7 European Legal Based Issues