Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CSA Certificate of Cloud Technology Security Knowledge (CCSK)

EDUTAINMENT COURSE E-Learning

CSA Certificate of Cloud Technology Security Knowledge (CCSK)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

Get the skills to manage information security in the cloud with our Certificate of Cloud Security Knowledge (CCSK ) training course. The course begins with a detailed description of cloud computing and expands into all major domains such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery.

Objectives
  • Cloud computing architectural framework
  • Legal and electronic discovery risk management
  • Information lifecycle management
  • Traditional security, business continuity, and disaster recovery
  • Incident response, notification, and remediation
  • Encryption and key management
  • Virtualization
  • Governance and enterprise risk management
  • Compliance and audit
  • Portability and interoperability
  • Data center operations
  • Application security
  • Identity and access management
Prerequisites
  • Validate competency and experience in cloud security
  • Demonstrate technical knowledge, skills, and abilities in developing a holistic cloud security program.
  • Gain access to tools, networking and idea exchange with peers.
  • Protect against threats with qualified professionals who have the expertise to competently design, build, and maintain a secure cloud business environment.
  • Ensure the use of universal language, circumventing ambiguity with industry-accepted cloud security terms and practice.
Target Audience
  • Science & Technology Professionals.
  • Anyone who wants to improve their knowledge of Cloud Security.
  • Anyone who wants to learn about information management and data security.

Module 1: Architecture

1.0 Cloud Security Overview Part 1

1.1 Cloud Security Overview Part 2

1.2 Cloud Diagrams

1.3 Cloud Services

Module 2: Governance and Enterprise Risk

2.0 Risk Management

2.1 Corporate Governance

2.2 Enterprise Risk Management

2.3 Risk Management Balance Process | Supply Chain Security

2.4 ERM Incidents | Recommendations Part 1

2.5 ERM Incidents | Recommendations Part 2

2.6 ERM Incidents | Recommendations Part 3

Module 3: Legal Issues - Contracts and Electronic

3.0 Cloud Legal Issues Part 1

3.1 Cloud Legal Issues Part 2 - Possession, Contract Consideration

3.2 Cloud Legal Issues Part 3 - Native Production

Module 4: Compliance and Audit Management

4.0 Audits

4.1 Compliance & Audit

4.2 Audit Recommendations

4.3 Audit Requirements

Module 5: Information Management and Data Security

5.0 Information & Security

5.1 Storage

5.2 Information Governance | Classification

5.3 Data Security

5.4 Data Security Part 2 - Protecting Data Moving

5.5 Client Database Encryption

5.6 PaaS Encryption

Module 6: Interoperability and Portability

6.0 Interoperability & Portability

6.1 Interoperability Recommendations

6.2 Portability Recommendations

6.3 Recommendations SaaS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

7.0 Business Conitnuity & Disaster Recovery

7.1 Assessing CSP Security

7.2 Equipment Maintenance

7.3 Recommendations

Module 8: Data Center Operations

8.0 Data Center Operations

Module 9: Incident Response

9.0 Incident Response

9.1 Testing

9.2 IaaS

9.3 C.E.R. = Containment, Eradication, & Recovery

Module 10: Application Security

10.0 Application Security

10.1 Security Testing

10.2 Audit Compliance

10.3 Security Assurance Recommendations

Module 11: Encryption and Key Management

11.0 Encryption & Key Management

11.1 Content Aware Encryption

11.2 Storage of Keys

Module 12: Identity, Entitlement, and Access Management

12.0 Building Access Control

12.1 Intro to Identity

12.2 Entitlement Process

12.3 Trust with Identity

12.4 Recommendations for Identity Management

Module 13: Virtualization

13.0 Virtualization

13.1 Hypervisor & Virtual Machine

13.2 Inter-Virtual Machine Attacks

13.3 Virtual Machine Encryption

13.4 Virtual Machine Recommendations & Requirements

Module 14: Security as a Service

14.0 Security as a Service (SaaS)

14.1 Implementing Advantages

14.2 Security Offerings

14.3 Intrusion Detection | Prevention

14.4 Business Continuity & Disaster Recovery

14.5 European CCSK

14.6 Top Security Benefits

14.7 European Legal Based Issues

EDUTAINMENT COURSE E-Learning
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 09:12:08
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top