Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Phone: +27 10 020 2067

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CSA Certificate of Cloud Technology Security Knowledge (CCSK)

E-COURSE:

CSA Certificate of Cloud Technology Security Knowledge (CCSK)

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

Get the skills to manage information security in the cloud with our Certificate of Cloud Security Knowledge (CCSK ) training course. The course begins with a detailed description of cloud computing and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery.

Objectives
  • Cloud computing architectural framework
  • Legal and electronic discovery risk management
  • Information lifecycle management
  • Traditional security, business continuity, and disaster recovery
  • Incident response, notification, and remediation
  • Encryption and key management
  • Virtualization
  • Governance and enterprise risk management
  • Compliance and audit
  • Portability and interoperability
  • Data center operations
  • Application security
  • Identity and access management
Prerequisites
  • Validate competency and experience in cloud security
  • Demonstrate technical knowledge, skills, and abilities in developing a holistic cloud security program.
  • Gain access to tools, networking and idea exchange with peers.
  • Protect against threats with qualified professionals who have the expertise to competently design, build, and maintain a secure cloud business environment.
  • Ensure the use of universal language, circumventing ambiguity with industry-accepted cloud security terms and practice.
Target Audience
  • Science & Technology Professionals.
  • Anyone who wants to improve their knowledge of Cloud Security.
  • Anyone who wants to learn about information management and data security.

Module 1: Architecture

1.0 Cloud Security Overview Part 1

1.1 Cloud Security Overview Part 2

1.2 Cloud Diagrams

1.3 Cloud Services

Module 2: Governance and Enterprise Risk

2.0 Risk Management

2.1 Corporate Governance

2.2 Enterprise Risk Management

2.3 Risk Management Balance Process | Supply Chain Security

2.4 ERM Incidents | Recommendations Part 1

2.5 ERM Incidents | Recommendations Part 2

2.6 ERM Incidents | Recommendations Part 3

Module 3: Legal Issues - Contracts and Electronic

3.0 Cloud Legal Issues Part 1

3.1 Cloud Legal Issues Part 2 - Possession, Contract Consideration

3.2 Cloud Legal Issues Part 3 - Native Production

Module 4: Compliance and Audit Management

4.0 Audits

4.1 Compliance & Audit

4.2 Audit Recommendations

4.3 Audit Requirements

Module 5: Information Management and Data Security

5.0 Information & Security

5.1 Storage

5.2 Information Governance | Classification

5.3 Data Security

5.4 Data Security Part 2 - Protecting Data Moving

5.5 Client Database Encryption

5.6 PaaS Encryption

Module 6: Interoperability and Portability

6.0 Interoperability & Portability

6.1 Interoperability Recommendations

6.2 Portability Recommendations

6.3 Recommendations SaaS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

7.0 Business Conitnuity & Disaster Recovery

7.1 Assessing CSP Security

7.2 Equipment Maintenance

7.3 Recommendations

Module 8: Data Center Operations

8.0 Data Center Operations

Module 9: Incident Response

9.0 Incident Response

9.1 Testing

9.2 IaaS

9.3 C.E.R. = Containment, Eradication, & Recovery

Module 10: Application Security

10.0 Application Security

10.1 Security Testing

10.2 Audit Compliance

10.3 Security Assurance Recommendations

Module 11: Encryption and Key Management

11.0 Encryption & Key Management

11.1 Content Aware Encryption

11.2 Storage of Keys

Module 12: Identity, Entitlement, and Access Management

12.0 Building Access Control

12.1 Intro to Identity

12.2 Entitlement Process

12.3 Trust with Identity

12.4 Recommendations for Identity Management

Module 13: Virtualization

13.0 Virtualization

13.1 Hypervisor & Virtual Machine

13.2 Inter-Virtual Machine Attacks

13.3 Virtual Machine Encryption

13.4 Virtual Machine Recommendations & Requirements

Module 14: Security as a Service

14.0 Security as a Service (SaaS)

14.1 Implementing Advantages

14.2 Security Offerings

14.3 Intrusion Detection | Prevention

14.4 Business Continuity & Disaster Recovery

14.5 European CCSK

14.6 Top Security Benefits

14.7 European Legal Based Issues

E-COURSE E-Learning Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
USD 195 USD 95 51% OFF
  • 09:12:08
    + Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top