- Home
- Courses
1,800 USD
World's #1 Bootcamp
CCSP Certification Training
Course Overview
Gain expertise in cloud security architecture, design, applications, and operations with this CCSP online training certification course. You will receive step-by-step guidance and an easy-to-follow, detailed lesson plan regarding every facet of CCSP, helping you accelerate your career in the growing field of cloud security.
CCSP Certification Key Features
- 8X higher interaction in live online classes conducted by industry experts
- Lifetime access to self-paced learning
- Industry-recognized course completion certificate
- 7 real-world case studies
Benefits
Cloud computing is poised to grow at least 6.5 times annually and the demand for cloud services will continue to grow by 22% per year through 2020. The annual salary of a principal information security professional ranges from $135,000–$190,000 (Source: Glassdoor).
Annual Salary
Source: Glassdoor
Hiring Companies
-
Source: Indeed
Training Options
ONLINE BOOTCAMP
- 90 days of flexible access to online classes
- Lifetime access to high-quality self-paced e-learning content and live class recordings
- 24x7 learner assistance and support
- Classes starting from:- April-2024: Weekend Class
CORPORATE TRAINING
- Blended learning delivery model (self-paced eLearning and/or instructor-led options)
- Flexible pricing options
- Enterprise grade Learning Management System (LMS)
- Enterprise dashboards for individuals and teams
- 24x7 learner assistance and support
CCSP Certification Training
Eligibility
This online CCSP certification course is ideal for anyone wishing to learn and explore career opportunities in IT network security and cloud computing. This course also is ideal for enterprise architects, security administrators, systems engineers, security architects, security consultants, security engineers, security managers, and system architects.
Pre-requisites
To obtain the CCSP certification course, you must have:
At least five years of working experience in IT, including three years of information security and one year of cloud security experience
Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification
CCSP Certification Training Course Course Content
-
1.1 CCSP Certification Overview: 08:28
-
1.2 Course Objectives: 02:48
-
1.01 Cloud Concepts, Architecture, and Design: 01:08
-
1.02 Security Concepts: 02:41
-
1.03 Key Security Concepts, Defense in Depth, Due Care, and Due Dilligence: 02:48
-
1.04 Security Controls and Functionalities: 02:43
-
1.05 Cloud Computing Concepts: 00:45
-
1.06 Business Drivers: 01:13
-
1.07 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out: 01:27
-
1.08 Cloud Computing Concepts Advantages: 01:05
-
1.09 Cloud Reference Architecture: 00:55
-
1.10 Cloud Computing Roles and Actors: 01:25
-
1.11 Cloud Service Categories Infrastructure as a Service (IaaS): 04:15
-
1.12 Cloud Service Categories Platform as a Service (PaaS): 04:21
-
1.13 Cloud Service Categories Software as a Service (SaaS): 03:31
-
1.14 Cloud Service Categories Management: 01:03
-
1.15 Cloud Deployment Models: Public Cloud: 00:47
-
1.16 Cloud Deployment Models: Private Cloud: 00:53
-
1.17 Cloud Deployment Models: Hybrid Cloud: 00:53
-
1.18 Cloud Deployment Models: Community Cloud: 00:55
-
1.19 Models and Characteristics: 01:13
-
1.20 Comparison of Cloud Deployment Models: 00:35
-
1.21 Case Study: Hybrid Cloud: 01:32
-
1.22 Cloud Technology Roadmap: 04:07
-
1.23 Impact of Related Technologies: 06:46
-
1.24 Cryptography: 02:36
-
1.25 Key Management: 01:06
-
1.26 IAM and Access Control: 02:12
-
1.27 Data Remanence: 01:00
-
1.28 Virtualization: 03:02
-
1.29 Common Threats: 03:42
-
1.30 Design Principles of Secure Cloud Computing: 02:05
-
1.31 Cost-Benefit Analysis: 00:33
-
1.32 Evaluate Cloud Service Providers: 02:46
-
1.33 SOC: 00:38
-
1.34 IT Security Evaluation: 01:28
-
1.35 FIPS: 02:14
-
1.36 Scenario: 02:17
-
1.37 Key Takeaways: 00:49
-
Knowledge Check
-
2.01 Cloud Data Security: 01:07
-
2.02 Cloud Data Life Cycle: 01:06
-
2.03 Cloud Data Life Cycle: Create, Store, Use, and Share: 03:29
-
2.04 Real-World Scenario: 01:28
-
2.05 Cloud Data Life Cycle: Archive: 02:10
-
2.06 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions: 02:38
-
2.07 Cloud Data Storage Architectures: 00:57
-
2.08 Cloud Data Storage Architectures: Storage Types for IaaS: 00:56
-
2.09 Cloud Data Storage Architectures: Storage Types for PaaS: 01:03
-
2.10 Cloud Data Storage Architectures: Storage Types for SaaS: 01:26
-
2.11 Cloud Data Storage Architectures: Threats to Storage Types: 02:23
-
2.12 Real-World Scenario: 00:55
-
2.13 Data Security Strategies: 00:44
-
2.14 Data Security Strategies: Encryption (Use Cases): 01:13
-
2.15 Data Security Strategies: Encryption Challenges: 02:06
-
2.16 Data Security Strategies: Encryption in IaaS: 02:33
-
2.17 Data Security Strategies: Database Encryption: 01:21
-
2.18 Data Security Strategies: Key Management: 02:02
-
2.19 Data Security Strategies: Key Storage in the Cloud: 01:25
-
2.20 Data Security Strategies: Masking: 01:25
-
2.21 Data Security Strategies: Data Anonymization: 00:48
-
2.22 Data Security Strategies: Tokenization: 01:32
-
2.23 Data Security Strategies: Homomorphic Encryption and Bit Splitting: 02:41
-
2.24 Real-World Scenario: 01:18
-
2.25 Data Security Strategies: Data Loss Prevention: 03:22
-
2.26 Scenario: 01:38
-
2.27 Data Discovery and Classification Technology: 04:14
-
2.28 Data Discovery and Classification Technology: Data Classification: 01:41
-
2.29 Data Discovery and Classification Technology: Challenges With Cloud Data: 01:20
-
2.30 Jurisdictional Data Protections for Personally Identifiable Information (PII): 01:34
-
2.31 Privacy Acts: GDPR: 04:07
-
2.32 Privacy Acts: GDPR Data Protection Principles: 03:09
-
2.33 Privacy Acts: United States: 01:00
-
2.34 Privacy Acts: HIPAA, FISMA, and SOX: 02:21
-
2.35 Jurisdictional Data Protections for PII: Responsibilites of Cloud Services: 01:31
-
2.36 Data Rights Management: 03:33
-
2.37 Data Retention, Deletion, and Archiving Policies: 00:27
-
2.38 Data Retention: 00:29
-
2.39 Data Deletion: 01:21
-
2.40 Real-World Scenario: 01:27
-
2.41 Data Archiving: 00:38
-
2.42 Real-World Scenario: 01:00
-
2.43 Legal Hold: 01:00
-
2.44 Auditability, Traceability, and Accountability of Data Events: 01:07
-
2.45 SIEM: 02:36
-
2.46 Chain of Custody: 00:39
-
2.47 Nonrepudation: 00:25
-
2.48 Real-World Scenario: 01:01
-
2.49 Key Takeaways: 00:49
-
Knowledge Check
-
3.01 Cloud Platform and Infrastructure Security: 01:04
-
3.02 Cloud Infrastructure Components: 01:22
-
3.03 Network and Communications: 02:10
-
3.04 Management Plane and Virtualization: 01:07
-
3.05 Factors That Impact Data Center Design: 01:53
-
3.06 Physical Design: Buy or Build: 00:47
-
3.07 Physical Design: Data Center Design Standards: 02:02
-
3.08 Physical Design: Uptime Institute: 01:00
-
3.09 Physical Design: Tiers: 03:34
-
3.10 Physical Design Features of Tiers: 01:03
-
3.11 Real-World Scenario: 01:03
-
3.12 Environmental Design Considerations: 02:59
-
3.13 Connectivity: 00:28
-
3.14 Hypervisor and Resource Allocation: 01:27
-
3.15 Risks Associated with Cloud Infrastructure: 00:23
-
3.16 Policy General and Virtualization Risks: 02:40
-
3.17 Cloud-Specific Legal and Non-Cloud Specific Risks: 03:04
-
3.18 Cloud Attack Vectors and Compensating Controls: 01:10
-
3.19 Business Scenario: 01:29
-
3.20 Design and Plan Security Controls: 02:13
-
3.21 Real-World Scenario: 01:09
-
3.22 Plan Disaster Recovery and Business Continuity: 01:07
-
3.23 Real-World Scenario: 01:04
-
3.24 BCDR Planning Factors and Disruptive Events: 00:58
-
3.25 Characteristics of Cloud Infrastructure: 00:23
-
3.26 BCDR strategies and Returning to Normal: 01:06
-
3.27 Real-World Scenario: 01:13
-
3.28 BCDR Creation: 02:34
-
3.29 BCDR Creation: Test: 05:11
-
3.30 Business Requirements: 01:09
-
3.31 BCDR Creation: Report and Revise: 00:42
-
3.32 Testing Types, Uptime, Availability, Activity, and Case Study: 03:55
-
3.33 Security Training and Awareness: 00:48
-
3.34 Real-World Scenario: 01:23
-
3.35 Key Takeaways: 00:34
-
Knowledge Check
-
4.01 Cloud Application Security: 01:25
-
4.02 Advocate Training and Awareness for Application Security: 02:14
-
4.03 Real-World Scenario: 00:59
-
4.04 Common Pitfalls: 02:36
-
4.05 Encryption Dependency Awareness: 00:40
-
4.06 Business Scenario: 01:15
-
4.07 Understanding Software Development Lifecycle Process: 00:34
-
4.08 Real-World Scenario: 00:57
-
4.09 Vulnerabilities and Risks: 01:21
-
4.10 Threat Modeling: 03:36
-
4.11 Real-World Scenario: 01:34
-
4.12 Encryption: 02:02
-
4.13 Sandboxing and Application Virtualization: 01:19
-
4.14 Federated Identity Management: 02:28
-
4.15 SAML Authentication: 02:49
-
4.16 Identity and Access Management: 01:42
-
4.17 Multi-Factor Authentication: 02:16
-
4.18 Real-World Scenario: 01:36
-
4.19 Cloud Access Security Broker: 02:18
-
4.20 Application Security Testing: 01:32
-
4.21 Software Supply Chain Management: 01:11
-
4.22 Real-World Scenario: 01:06
-
4.23 Key Takeaways: 00:49
-
Knowledge Check
-
5.01 Cloud Security Operations: 01:31
-
5.02 Secure Configuration of Hardware: Servers: 03:45
-
5.03 Secure Configuration of Hardware: Storage Controllers: 00:37
-
5.04 Real-World Scenario: 01:27
-
5.05 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription: 02:26
-
5.06 Secure Configuration of Hardware: Virtual Switches: 01:38
-
5.07 Configuration of VM Tools: 00:49
-
5.08 Configuration of VM Tools Running a Physical Infrastructure: Legal, Compatibility, Control, and Log Data: 01:35
-
5.09 Configuration of VM Tools Running a Physical Infrastructure: PCI DSS Access, Upgrades and Changes, and Failover Technology: 01:25
-
5.10 Configuration of VM Tools Running a Physical Infrastructure: Compliance, Regulations, and Outsourcing: 01:41
-
5.11 Configuration of VM Tools Running a Physical Infrastructure: Placement of Security, Virtualization, VM: 01:37
-
5.12 Real-World Scenario: 01:26
-
5.13 Securing Network Configuration: 04:06
-
5.14 Real-World Scenario: 01:11
-
5.15 Clustered Hosts: 01:42
-
5.16 Dynamic Optimization and Clustered Storage: 01:48
-
5.17 Maintenance Mode and Patch Management: 03:25
-
5.18 Performance Monitoring: 01:21
-
5.19 Real-World Scenario: 01:10
-
5.20 Network Security Controls: Layered Security and Honeypots: 02:47
-
5.21 Network Security Controls: SIEM: 00:44
-
5.22 Log Management: 01:42
-
5.23 Orchestration: 01:10
-
5.24 Availability of Guest OS: 01:59
-
5.25 Operations Management: Part One: 02:16
-
5.26 Real-World Scenario: 01:22
-
5.27 Operations Management: Part Two: 01:46
-
5.28 Risk Management Process: Framing Risk and Risk Assessment: 01:55
-
5.29 Quantitative Risk Analysis: 01:29
-
5.30 Scenario: 01:18
-
5.31 Risk Response and Risk Monitoring: 01:18
-
5.32 Collection and Preservation of Digital Evidence: 04:08
-
5.33 Communication with Relevant Parties: 01:32
-
5.34 Real-World Scenario: 01:34
-
5.35 Security Operations Center: 02:15
-
5.36 Key Takeaways: 01:04
-
Knowledge Check
-
6.01 Legal, Risk, and Compliance: 01:28
-
6.02 Case Study: 02:28
-
6.03 Legislative Concepts: 04:39
-
6.04 Intellectual Property Laws: 04:56
-
6.05 Case Study: 01:27
-
6.06 Business Scenario: 01:04
-
6.07 Acts and Agreements: 03:22
-
6.08 Case Study: 01:21
-
6.09 NERC: 01:36
-
6.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP): 01:13
-
6.11 Jurisdictional Differences in Data Privacy: 01:27
-
6.12 Terminologies and eDiscovery: 01:09
-
6.13 Forensic Requirements and PII: 02:02
-
6.14 Gap Analysis, SOC Reports, and Chain of Custody: 02:59
-
6.15 Vendor Management: 01:35
-
6.16 Cloud Computing Policies and Risk Attitude: 02:37
-
6.17 SLA: 03:32
-
6.18 Quality of Service: 01:44
-
6.19 Risk Mitigation: 03:21
-
6.20 Risk Management Metrics and ISO Standard: 01:44
-
6.21 Real-World Scenario: 01:12
-
6.22 Key Takeaways: 00:49
-
Knowledge Check
CCSP Certification Training FAQs
Terms and Conditions:
Our training comes with a 100% money-back guarantee. WeInspire believes in our highly effective blended learning methodology and its ability to provide learners with the knowledge and confidence to pass the CCSP exam in the first attempt. If you do not pass the CCSP exam on the first attempt, WeInspire will refund the course price to you.
To ensure your success, we strongly recommend that you take the CCSP exam within a week of the course completion date—or a maximum of 45 days from the completion of the online training. This way, the course materials will be fresh in your mind.
CCSP Exam Attempts:
Attempt | Time Frame | Result | Money back |
First | Within 6 months (180 days) from enrollment date | Did Not Pass | Refund full course price |
Refund Process: If you do not pass the exam on the first attempt, WeInspire will refund the full course price to you. To receive a refund, you must make a request through the Help and Support Forum. You must submit a copy of your scorecard along with the date you completed your online classroom training. WeInspire will refund the course price within 30 days of receiving all required documentation. We will process the refund using the same method you used to pay for the course.
Terms and Conditions:
This money-back guarantee applies only to WeInspire’s CCSP blended learning. It is not applicable for WeInspire’s Self-Paced Learning CCSP course. The guarantee is valid only for participants who have paid the entire enrollment fee.
The guarantee becomes void if:
- Participants do not take the CCSP examination within 45 days of unlocking the certificate.
- Participants do not maintain 100% attendance during the training sessions.
- Participants fail to score at least 80% in at least 2 simulation tests available at lms. WeInspire
- Participants fail to book their exam within 6 months from the date of enrollment
- Participants do not follow the instructions of the trainer and do not complete the exercises given during the training.
- Participants do not submit the required documents to WeInspire.
- Participants failed to request a refund within 15 days of receiving their results
CCSP is an acronym that stands for; Certified Cloud Security Professional. This certification validates your advanced skills and knowledge in the ability to design, manage, and safeguard data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the Cyber Security experts at (ISC)².
Benefits of being CCSP-Certified are:
- Increases career visibility and credibility
- The certification creates job security and new job opportunities
- Allows you to gain versatile vendor-neutral skills that can be applied to different technologies and methodologies
- Gain access to a global community of like-minded cybersecurity leaders
- Be better prepared to stem cyber attacks and inspire a safe and secure cyber world
- On average, (ISC)² members report earning 35% more than non-members
To obtain the CCSP certification course, you must have at least five years of working experience in IT including three years of information security and one year of cloud security experience. Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification.
All of our highly qualified instructors are industry experts with years of relevant industry experience working with front-end development technology. Each one has gone through a rigorous selection process that includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating remain on our faculty. All trainers are also practitioners in the field which they teach assuring that you are learning from someone with real-world, industry experience.
The tools you’ll need to attend the CCSP Course are:
- Windows: Windows XP SP3 or higher
- Mac: OSX 10.6 or higher
- Internet speed: Preferably 512 Kbps or higher
- Headset, speakers, and microphone: You’ll need headphones or speakers to hear instructions clearly, as well as a microphone to talk to other professionals learning alongside you. You can use a headset with a built-in microphone, or separate speakers and microphone based upon your preference.
Request More Information
CCSP Certification Training Exam & Certification
The content of the CCSP exam has been refreshed to reflect the most common issues cloud security professionals face, along with the best practices for mitigating those issues. Some topics have been updated while others have been realigned. The result is an exam that more accurately reflects the knowledge and hands-on experience with cloud security architecture, design, operations, and service orchestration.
Previous CCSP Domain Name
Domain 1: Architectural Concepts & Design Requirements
Domain 2: Cloud Data Security
Domain 3: Cloud Platform and Infrastructure Security
Domain 4: Cloud Application Security
Domain 5: Operations
Domain 6: Legal & Compliance
New CCSP Domain Name
Domain 1: Cloud Concepts, Architecture, and Design
Domain 2: Cloud Data Security
Domain 3: Cloud Platform and Infrastructure Security
Domain 4: Cloud Application Security
Domain 5: Cloud Security Operations
Domain 6: Legal Risk and Compliance
The cumulative scoring weight of each area is also changing.
Domain 1: Cloud Concepts, Architecture, and Design – 17%
Domain 2: Cloud Data Security – 19%
Domain 3: Cloud Platform and Infrastructure Security – 17%
Domain 4: Cloud Application Security – 17%
Domain 5: Cloud Security Operations – 7%
Domain 6: Legal, Risk, and Compliance – 13%
-
The changes are effective beginning August 1, 2019.
-
The CCSP certification exam costs $599.
The CCSP exam consists of 125 multiple-choice questions. To pass the exam, you will need to have a minimum passing score of at least 700/1000 (or 70 percent) in order to gain your certification.
-
Refreshed CCSP exams are available only in English.
To unlock your certificate from WeInspire, you must complete 85 percent of the self-paced learning and successfully pass the course end assessment with a score of 70 percent or above.
CCSP Certification Training Advisor
Technical Trainer, Owner- Steppingstonesolutions Inc
Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.
Why Online Bootcamp
Structured guidance ensuring learning never stops
24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
Develop skills for real career growth
Cutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
Learn from experts active in their field, not out-of-touch trainers
Leading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
Learn by working on real-world problems
Capstone projects involving real world data sets with virtual labs for hands-on learning
Reviews By Our Success & Top Learners
This company did a great job in assisting me reach PMP goal. I highly recommend them. Professionalism and punctuality are my primary reasons for recommending this company. You can’t go wrong in choosing them.
The courses are fantastic and the instructors are so fun and knowledgeable. I only wish we found it sooner
I believe in lifelong learning and WeInspire is a great place to learn from experts. I’ve learned a lot and recommend it to all my friends.
It was a great learning experience. My trainer, Vaishali delivered each session well. All topics were explained with in-depth theory, real-time examples, and execution of the same in Python. Her teaching methodology enhanced the learning process.
I have done AWS Training from WeInspire. Over Training & Content is good and instructor is very good. Thank you.
I took online training for Palo Alto Certification exams. Institute was committed on the timelines and provided excellent study plan with ample study material resulting in a successful PCNSE certification.
AWS and Azure Trainings were fantastic. Thanks alot Weinspire for providing us such an amazing trainer.
I have taken training from Weinspire techsolution and now cism certified. Thanks Weinspire tech team.
he OSCP course offered by WeInspireTechSolution is nothing short of brilliant! As someone with a keen interest in cybersecurity, I found the hands-on approach of this course to be extremely beneficial. The labs were challenging yet rewarding, providing me with practical experience in penetration testing techniques. The instructor's expertise and guidance were invaluable, helping me navigate through complex scenarios. I highly recommend this course to anyone looking to advance their career in cybersecurity.
Trending Master Programs: CISSP Certification Training Course | CISM Certification Training | CCSP Certification Training | CISA Certification Training Course | CEH v11 - Certified Ethical Hacking Course |
Copyright © 2022, WEINSPIRE TECH SOLUTION PRIVATE LIMITED. All Rights Reserved.