Descripción
Introduction
With more companies moving to the cloud, the need for cloud security is becoming increasingly apparent. Because of this, the IT and cybersecurity industries have seen an increase in demand for knowledgeable experts to help companies stay secure in the cloud.
The Certificate of Cloud Security Knowledge (CCSK) is an introductory course targeted towards professionals working in IT and cybersecurity. This course provides a broad overview of cloud security and allows students to gain critical insights into how security issues change in the cloud, including data security, key management, and identity and access management.
Target Audience
This introductory level course to cloud security is targeted towards learners enrolled in technology degree programs at higher education institutions and IT professionals who want to pursue a career in Cloud Security.
Prerequisites
There is no official work experience required, however, it is helpful for attendees to have at least a basic understanding of security fundamentals such as firewalls, secure development, encryption, and identity and access management which can be learned by taking the Cisco Networking Academy Introduction to Cybersecurity and Cybersecurity Essentials courses.
Certificate
- This course prepares students to take the certificate exam to earn their CCSK.
- This course also provides possible Continuing Professional Education (CPE) credits.
Although there are currently no official CPE designations for this course, we do issue a certificate of completion with the stated number of hours it takes to complete the course. Students can then use this certificate of completion for CPE credit submission. Please note, however, that the actual qualification and distribution of CPE credits will be determined by whoever receives the request.
Course Description
Learn how to develop a holistic cloud security program relative to globally accepted standards using the Cloud Security Alliance (CSA) Security Guidance V.4 and recommendations from European Union Agency for Cybersecurity (ENISA). You will also be introduced to CSA’s governance, risk, and compliance tool for the cloud - Cloud Controls Matrix (CCM).
Curriculum Objectives
The aim of this course is to spark the student’s interest in cloud security and familiarize the student with the universal concepts of cloud computing. In addition, the course provides students with a base of knowledge on cloud computing security theory and acquaints students with security threats and best practices for securing the cloud. This course also assists students as they prepare to take the CCSK exam.
Programa
Module 1: Cloud Architecture
- Understand the components of cloud infrastructure
- Assess the security implications of virtual networks and workloads
- Learn the security advantages and disadvantages of working with cloud infrastructure
- Evaluate how to secure the cloud management plane
- Learn how to manage business continuity for cloud computing
Module 2: Infrastructure Security for Cloud
- Understand the components of cloud infrastructure
- Assess the security implications of virtual networks and workloads
- Learn the security advantages and disadvantages of working with cloud infrastructure
- Evaluate how to secure the cloud management plane
- Learn how to manage business continuity for cloud computing
Module 3: Managing Cloud Security and Risk
- The implications of cloud on governance, with a focus on contracts and controls
- How cloud affects enterprise risk management
- Some top-level legal areas cloud tends to affect (but not legal advice)
- Managing compliance and audits for cloud deployments
- Tools from the Cloud Security Alliance to help assess and manage risk
Module 4: Data Security for Cloud Computing
- Understand the different cloud storage models
- Define security issues for data in the cloud
- Assess the role and effectiveness of access controls
- Learn different cloud encryption models
- Understand additional data security options
- Introduce data security lifecycle
Module 5. Application Security and Identity Management for Cloud Computing
- Discover how application security differs in cloud computing
- Review secure software development basics and how those change in the cloud
- Leverage cloud capabilities for more secure cloud applications
Module 6. Cloud Security Operations
- How to select cloud providers
- The advantages and disadvantages of security as a service
- The different major security as a service categories
- How to respond to security incidents in the cloud
- The security issues of technologies related to cloud computing: Big Data, mobile, serverless, IoT
- Security as a service recommendations