Arcitura Certified Cloud Security Specialist

The Cloud Security Specialist track is comprised of CCP Modules 1, 2, 7, 8 and 9. The final course module consists of a series of lab exercises that require participants to apply their knowledge of the preceding courses in order to fulfill project requirements and solve real world problems. Completion of these courses as part of a virtual or on-site workshop results in each participant receiving an official digital Certificate of Completion, as well as a digital Training Badge from Acclaim/Credly.

Category:

Description

WHAT YOU WILL LEARN

A Certified Cloud Security Specialist has detailed knowledge of common security threats, security controls and associated technologies and practices related to securing cloud platforms, cloud services and associated cloud-based resources and infrastructure. Depending on the exam format chosen, attaining the Cloud Security Specialist Certification can require passing a single exam or multiple exams. Those who achieve this certification receive an official digital Certificate of Excellence, as well as a digital Certification Badge from Acclaim/Credly with an account that supports the online verification of certification status.

MODULE OVERVIEW

The Cloud Security Specialist certification track is associated with the following courses and the courses can be delivered via instructor-led training.

CCP Module 1: Fundamental Cloud Computing

This foundational course provides end-to-end coverage of fundamental cloud computing topics as they pertain to both technology and business considerations. The course content is divided into a series of modular sections, each of which is accompanied by one or more hands-on exercises.
The following primary topics are covered:
– Fundamental Cloud Computing Terminology and Concepts
– Basics of Virtualization
– Specific Characteristics that Define a Cloud
– Understanding Elasticity, Resiliency, On-Demand and Measured Usage
– Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services
– Cloud Resource Administrator and Cloud Service Owner Roles
– Cloud Service and Cloud Service Consumer Roles
– Understanding the Software as a Service (SaaS) Cloud Delivery Model
– Understanding the Platform as a Service (PaaS) Cloud Delivery Model
– Understanding the Infrastructure as a Service (IaaS) Cloud Delivery Model
– Combining Cloud Delivery Models
– Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models
– Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs
– Formulas for Calculating and Rating SLA Quality of Service Characteristics

CCP Module 2: Cloud Technology Concepts

This course explores a range of the most important and relevant technology-related topics that pertain to contemporary cloud computing platforms. The course content does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and containerization.
Proven technologies are defined and classified as concrete architectural building blocks called “mechanisms”. The purpose of this course is to introduce cloud computing-related technology topics in a manner that is accessible to a wide range of IT professionals, as well as to empower participants with an understanding of the fundamental mechanics of a cloud platform, how the different “moving parts” can be combined, and how to address common threats and pitfalls.
The following primary topics are covered:
– Cloud Computing Mechanisms that Establish Architectural Building Blocks
– Virtual Servers, Containers, Ready-Made Environments, Failover Systems & Pay-Per-Use Monitors
– Automated Scaling Listeners, Multi-Device Brokers & Resource Replication
– Understanding How Individual Cloud Computing Mechanisms Support Cloud Characteristics
– An Introduction to Containerization, Container Hosting & Logical Pod Containers
– A Comparison of Containerization and Virtualization
– Cloud Balancing and Cloud Bursting Architectures
– Common Risks, Threats and Vulnerabilities of Cloud-based Services & Cloud-hosted Solutions
– Cloud Security Mechanisms used to Counter Threats and Attacks
– Understanding Cloud-Based Security Groups and Hardened Virtual Server Images
– Cloud Service Implementation Mediums (including Web Services and REST Services)
– Cloud Storage Benefits and Challenges, Cloud Storage Services, Technologies and Approaches
– Non-Relational (NoSQL) Storage Compared to Relational Storage
– Cloud Service Testing Considerations and Testing Types
– Service Grids and Autonomic Computing
– Cloud Computing Industry Standards Organizations

CCP Module 3: Fundamental Cloud Security

This foundational course provides a well-rounded, end-to-end presentation of essential techniques, mechanisms, patterns and industry technologies for establishing cloud-based security controls and security architectures. The cloud security fundamentals covered in Module 2 are continued by introducing threat categorizations and new cloud security mechanisms.
The course then delves into a series of cloud security mechanisms and associated architectural patterns that explore a variety of topics, including cloud network security, identity and access management, and trust assurance.
The following primary topics are covered:
– Cloud Security Basics
– Common Cloud Security Mechanisms
– Cloud Security Threats
– Cloud Security Threat Categorization Methodology
– Identification and Treatment of Common Threats
– Cloud Network Security Patterns and Supporting Mechanisms
– Securing Network Connections and Cloud Authentication Gateways
– Collaborative Monitoring and Logging
– Independent Cloud Auditing
– Cloud Identity and Access Management Patterns and Supporting Mechanisms
– Federating and Enabling Secure Interoperability among Cloud Consumers
– Trust Assurance Patterns and Supporting Mechanisms
– Trust Attestation and Establishing Trustworthiness

CCP Module 4: Advanced Cloud Security

This advanced course covers cloud security mechanisms and architectural design patterns that address data and access control security for virtual machines, as well as trust boundaries, geotagging and BIOS security.
The course also explains common methods used by attackers to breach organizational resources and provides a methodology for countering such attacks. The course concludes by demonstrating the relationship between threats, attacks, and risks via threat modeling.
The following primary topics are covered:
– Cloud Service Security Patterns and Supporting Mechanisms
– Virtual Machine Platform Protection Patterns
– Considerations for Setting Up Secure Ephemeral Perimeters
– Trusted Cloud Resource Pools and Cloud Resource Access Control
– Permanent Data Access Loss Protection
– Cloud Data Breach Protection
– Isolated Trust Boundaries
– The Attack Lifecycle and the Security Lifecycle
– Proactive Mitigation vs. Incidence Response
– Threats, Vulnerabilities, Impacts from Exploitation
– Threat Modeling, Threats and Mitigations

CCP Module 5: Cloud Security Lab

This module presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered previously in course modules 7 and 8. Completing this lab will help highlight areas that require further attention and will further prove hands-on proficiency in cloud computing security practices, mechanisms and architectural patterns as they are applied and combined to solve real-world problems.
As a hands-on lab, this course provides a set of detailed exercises that require participants to solve a number of inter-related problems, with the ultimate goal of evaluating, designing and correcting cloud security technology architectures to fulfill specific sets of solution and business automation requirements.
For instructor-led delivery of this lab course, the Certified Cloud Trainer works closely with participants to ensure that all exercises are carried out completely and accurately. Attendees can voluntarily have exercises reviewed and graded as part of the class completion.
For individual completion of this course as part of the Module 9 Study Kit, a number of supplements are provided to help participants carry out exercises with guidance and resource references.

Duration: 5 days

PREREQUISITES
  • There are no formal prerequisites for the certification exam
EXAM & CERTIFICATION

You can take exams anywhere in the world via Pearson VUE testing centers, Pearson VUE online proctoring and Arcitura on-site exam proctoring at your location.
You are provided with three flexible exam format options:
Complete Exam C90.CSP, a single combined exam for the entire Cloud Security Specialist certification track. Recommended for those who want to only take a single exam that encompasses all course modules within this track.
Complete the partial version of Exam C90.CSP. Recommended for those who have already obtained a CCP certification and would like to achieve the Cloud Security Specialist Certification without having to be retested on CCP Modules 1 and 2.
Complete one module-specific exam for each course module in Cloud Security Specialist Certification track. This is recommended for those who want to progress gradually through the track and who would like to be assessed after each course module before proceeding to the next.
.

    CLASSROOM / INSTRUCTOR LED
    • High-impact learning with case studies
    • Delivered by certified instructors
    • Targeted learning for real projects

    Check Schedule


    Fill this form below and our executive will get in touch with you shortly

    Share with your friends

    Why Consuldesk

    Certified and Experienced Instructors

    Post Training Support

    Customized Training

    Flexible Schedule

    Access to Recorded Sessions

    Choose your preferred Learning Mode

    1 to 1 Training

    Customised Schedule
    Learn at you dedicated hour
    Instant Clarification of doubt

    Online Training

    Flexibility, Convenience & Time Saving
    More effective
    Economical Learning

    Corporate Training

    Anytime, Anywhere – Across the Globe
    Hire a Trainer at your own pace
    Customised Training

    Looking for a customized training?

    Share with your friends