TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 110 - Certified Cloud Security Knowledge (CCSK) Preparation Course

Code Start Date Duration Venue
IT-S 110 22 April 2024 5 Days Istanbul Registration Form Link
IT-S 110 20 May 2024 5 Days Istanbul Registration Form Link
IT-S 110 03 June 2024 5 Days Istanbul Registration Form Link
IT-S 110 15 July 2024 5 Days Istanbul Registration Form Link
IT-S 110 12 August 2024 5 Days Istanbul Registration Form Link
IT-S 110 09 September 2024 5 Days Istanbul Registration Form Link
IT-S 110 07 October 2024 5 Days Istanbul Registration Form Link
IT-S 110 04 November 2024 5 Days Istanbul Registration Form Link
IT-S 110 02 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

The aim of the course is to prepare participants to CCSK certification, as well as help them to gain insight about Cloud Security World.

The CCSK - Foundation course is based on V3.0 of the CCSK exam and the CSA Security Guidance for Critical Areas of Cloud Computing V3.0.

The Cloud Computing Security Knowledge- Foundation class provides students a comprehensive review of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK v3.0 certificate exam. Starting with a detailed description of cloud computing, the course covers all major domains in the Guidance v3.0 document from the Cloud Security Alliance, and the recommendations from the European Network and Information Security Agency (ENISA).

This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security. (We recommend attendees have at least a basic understanding of security fundamentals, such as firewalls, secure development, encryption, and identity management). 

This is a course preparation for certification exam/procedure. The fee doesn't include exam fee. The exam date and application should be done by participant(s) themselves. Please contact us for details and further clarification

Course Overview

  • Understandıng how cloud works 
  • Exploring Policy and organizational risks
  • Understanding the legal issues governing in the cloud 
  • Understanding the Security benefits of cloud computing
  • Being aware of vulnerabilities

Who Should Attend?

  • Security Analyst
  • Security Systems Engineer
  • Chief Information Security Officer
  • Director of Security
  • Network Architect

Course Details/Schedule

Day 1

  • CSA Guidance
  • Section I. Cloud Architecture
  • Domain 1: Cloud Computing Architectural Framework
  • Section II. Governing in the Cloud
  • Domain 2: Governance and Enterprise Risk Management
  • Domain 3: Legal Issues: Contracts and Electronic Discovery
  • Domain 4: Compliance and Audit Management 
  • Domain 5: Information Management and Data Security 
  • Domain 6: Interoperability and Portability 

Day 2

  • Section III. Operating in the Cloud 
  • Domain 7: Traditional Security, Business Continuity, and Disaster Recovery 
  • Domain 8: Data Center Operations 
  • Domain 9: Incident Response 
  • Domain 10: Application Security 
  • Domain 11: Encryption and Key Management 
  • Domain 12: Identity, Entitlement, and Access Management 
  • Domain 13: Virtualization 
  • Domain 14: Security as a Service

Day 3

  • ENISA (European Network and Information Security Agency) – Cloud Computing Risk Assessment Guidelines
  • Security benefits of cloud computing
  • Security and the benefits of scale 
  • Security as a market differentiator
  • Standardised interfaces for managed security services 
  • Rapid, smart scaling of resources 
  • Audit and evidence-gathering 
  • More timely and effective and efficient updates and defaults 
  • Audit and SLAs force better risk management 
  • Benefits of resource concentration

Day 4

  • Risk assessment
  • Use-case scenarios 
  • Risk assessment process
  • Risks
  • Policy and organizational risks
  • Technical risks
  • Legal risks
  • Risks not specific to the cloud

Day 5

  • Vulnerabilities
  • Vulnerabilities not specific to the cloud
  • Assets
  • Recommendations and key messages
  • Information assurance framework
  • Information assurance requirements
  • Research recommendations
  • Cloud computing – Key legal issues
  • SME use-case scenario
  • Other use-case scenarios