Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Cloud Security Officer
Description
Certified Cloud Security Officer C)CSO Certification Introduction
The Certified Cloud Security Officer C)CSO certification course is a comprehensive program designed to elevate your understanding and skills in cloud security. This in-depth course is an ideal choice for professionals who are keen to advance their careers in the rapidly evolving field of cloud technology. If you have a background in virtualization technology, general security, or hold positions such as Virtualization Administrators, Cloud Administrators, CIOs, Auditors, or Compliance Officers, this course is tailored to enhance your expertise.
Throughout this 5-day, instructor-led course, you’ll be immersed in a curriculum that balances theoretical knowledge with practical application. You’ll gain insights into the latest cloud security architecture, understand how to perform thorough risk assessments, and learn the intricacies of governance and legal aspects in cloud security. This course is not just about learning; it’s about becoming a leader in cloud security.
In addition to expanding your technical know-how, the C)CSO certification course is also designed to optimize your career opportunities in the field of cloud security. As businesses increasingly migrate to cloud platforms, the demand for skilled cloud security professionals is soaring. By completing this course, you’ll not only earn a prestigious certification but also equip yourself with the skills to tackle real-world security challenges in cloud environments.
Whether you aim to secure a new role, enhance your current position, or provide more value to your organization, the C)CSO course is your gateway to achieving these goals. Enroll now and take a significant step towards becoming a certified expert in cloud security, ready to meet the demands of today’s digital landscape.
Course Objectives
- By completing our C)CSO certification course, you’ll master essential cloud security concepts.
- Gain real-world insights into cloud security and industry standards.
- Assess cloud migration security risks and explore risk mitigation strategies.
- Develop expertise in governance, risk management, and controls, with a focus on SLAs.
- Dive into unique cloud-related legal issues, international law, contracts, and eDiscovery.
- Learn virtualization principles, their relation to cloud layers, and essential security measures.
- Explore the cloud data lifecycle, design secure data storage, and implement robust data security strategies.
- The course also covers data center operations, interoperability, traditional security, business continuity, incident response, application security, encryption, identity management, and auditing and compliance.
Certification Exam:
- The Certified Cloud Security Officer exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account.
- The exam will take approximately 2 hours and consist of 100 multiple choice questions.
- A minimum grade of 70% is required for certification.
Prerequisites
- Recommended minimum one-year experience with virtualization technology or equivalent knowledge.
- General understanding of cloud architectures.
- Minimum one-year experience with general security.
Audience
- Virtualization Administrators
- Cloud Administrators, CIO
- Virtualization and Cloud Auditors
- Virtualization and Cloud Compliance Officers
- Anyone that needs a general understanding of security in the Cloud
Certified Cloud Security Officer C)CSO Certification Outline
Introduction to Cloud Computing and Architecture
- Cloud Computing Terminology
- Cloud Computing Definition
- Cloud Computing Characteristics
- Cloud Computing Benefits
- Cost Benefit Analysis Reference Model
- What is Security for the Cloud?
Cloud Risks
- Cloud Migration Security Evaluation
- ENISA Risk Evaluation
- Cloud Controls Matrix
- Relevant CCM Controls
ERM and Governance
- Application of Governance and Risk Management to the Cloud
- Importance of the SLA
- Relevant CCM controls
Legal Issues
- Understanding Unique Risks in the Cloud International Law and Potential Conflicts eDiscovery
- Contract Considerations
- Relevant CCM Controls
Virtualization
- Virtualization Principles
- Key Components Mapped to Cloud Layer
- Key Security Concerns
- Other Technologies Used in the Cloud
- The Layers
- Relevant CCM Controls
Data Security
- Cloud Data Life Cycle
- Design and Implement Cloud Data Storage Architectures
- Design and Apply Data Security Strategies
- Understand and Implement Data Discovery and Classification Technologies
- Design and Implement Relevant Jurisdictional Data Protection for PII
- Design and Implement Data Rights Management
- Plan and Implement Data Retention, Deletion and Archival Policies
- Design and Implement Auditability, Traceability, and Accountability of Data Events
- Relevant CCM Controls
Data Center Operations
- Build Logical Infrastructure for Cloud Environment
- Manage Logical Infrastructure for Cloud Environment
- Manage Communications with Relevant Parties
- Relevant CCM Controls
Interoperability and Portablility
- Interoperability
- Portability
- Relevant CCM Controls
Traditional Security
- The Physical Environment
- Support the Planning Process for the Data Center Design
- Run Physical Infrastructure for Cloud Environment
- Implement and Build Physical Infrastructure for Cloud Environment
- Manage Physical Infrastructure for Cloud Environment
- Relevant CCM Controls
BCM and DR
- Disaster Recovery and Business Continuity Management
- Examples
- Relevant CCM Controls
Incident Response
- Incident Response
- Forensics
- Relevant CCM Controls
Application Security
- Training and Awareness
- Secure Software Development Life Cycle Process
- Application of the Secure Software Development Life Cycle
- Verifying the use of Secure Software
- Identity and Access Management (IAM) Solutions
- Additional components for the Cloud Software Assurance and Validation
- Relevant CCM Controls
Encryption and Key Management
- Review from other chapters
- Key Management in today’s cloud services
- Recommendations
- Relevant CCM Controls
Identity, Entitlement and Access Management
- Introduction to Identity and Access Management Identities and Attributes
- Architectures for Interfacing to Identity and Attribute Providers
- The Identity Recommendations
- Relevant CCM Controls
Auditing and Compliance
- Compliance and Audit Cloud Issues
- Assurance Frameworks
- Auditing
- Relevant CCM Controls
Labs
- Lab 1: Cloud Migration Evaluation
- Lab 2: Service Level Agreement (SLA) Compliance
- Lab 3: Virtualization 101
- Lab 4: Understanding Network Traffic
- Lab 5: Hardening your Virtual Machines
- Lab 6: ESXi Host Hardening
- Lab 7: Hardening vCenter
- Lab 8: Basics of Data Security in Azure
- Lab 9: IaaS
- Lab 10: Deploying a Cloud
- Lab 11: Basic Data Center Operations in Azure
- Lab 12: Interoperability and Portability
- Lab 13: Business Continuity in Azure
- Lab 14: PaaS in Azure
- Lab 15: Encryption in Azure
- Lab 16: Identity and Access Management in Azure
- Lab 17: SaaS
- Lab 18: S-P-I Model Exercise
- Lab 19: Cloud Business Driver Audit Exercise
- Lab 20: IaaS Risk Assessment
- Lab 21: Identity and Access Control Management in the Private Cloud
- Lab 22: VM Security Audit
- Lab 23: Encryption/Key Management in SaaS
$4000.00
|
5 Days Course |