About our courses

Through years of experience working with more than 1000 top companies in the world, we ́ve architected the Readynez method for learning.
Train in any technology using the award-winning Readynez method and combine any variation of learning style, technology and place, to take learning ambitions from intent to impact.

Learn more about Readynez Training
Isc2 CCSP
9,20

(359 Reviews)

(ISC)2 CCSP - Certified Cloud Security Professional

Ditt personlige Larning Program med alt du trenger for å forberede deg best mulig til (ISC)2 CCSP eksamenen og bli en Certified Cloud Security Professional, med støtte fra din ekspertinstruktør.

course: (ISC)2 CCSP - Certified Cloud Security Professional

Varighed: 5 dag(er)

Format: [Dictionary item: Virtual or Classroom]

Forberedelse til Eksamen : (ISC)2 Certified Cloud Security Professional (CCSP)

Forberedelse til Sertifisering : (ISC)2: Certified Cloud Security Professional (CCSP)

Det Beste Kurset For å få Din CCSP Eksamen og Sertifisering - med Sertifiseringsgaranti

Å oppnå (ISC) Certified Cloud Security Professional sertifiseringen er ikke en lett oppgave, men med ditt Readynez kurs og Learning Program har vi gjort alt vi kan for å støtte deg fra start til slutt, og sikre at du har de optimale forutsetningene for å lykkes. Dette inkluderer de beste ressursene som er tilgjengelige for å hjelpe deg med å forberede deg, inkludert relevante online kurs, Practice Test for eksamensforberedelser, study guides, eksamensstøtte og veiledninger osv., alt gjort lett tilgjengelig for deg i vår Learning Platform. Velger du vårt Virtual Training-alternativ, bidrar du også til en mer bærekraftig verden med en reduksjon i CO2-utslipp på 96% sammenlignet med alternativet i klasserommet.

  • Inkluderer omfattende læremateriell for best mulig eksamensforberedelse
  • Best rangerte og verdsatte Cloud Security-sertifisering på markedet
  • Inkluderer tilgang til online CCSP-kurs fra Pluralsight skrevet av Kevin Henry
  • Full støtte tilgjengelig som hjelper deg med å registrere deg, forberede deg til og ta eksamen

Tilbakemeldinger Fra Våre CCSP Deltakere

Hans Sjöberg
Hans Sjöberg

Veldig givende og lærerik trening med en profesjonell og lærerik instruktør. Jeg skal være godt forberedt når jeg tar eksamen

Kevin Reid
Kevin Reid

Jeg vil anbefale Readynez på det sterkeste for profesjonelle som trenger tid til å fokusere på trening + sertifisering


All Du Trenger For Å Oppnå De Resultatene Du Ønsker

Ditt personlige Learning Program vil gi deg ferdighetene du trenger slik at du kan gjøre mer av det du elsker. Learning Programmet's tre trinn er utformet slik at du lærer nye ferdigheter som vil åpne opp for nye muligheter for deg.


Slik Sertifiserer Vi Deg

Readynez365: Ditt personlige Learning Program

Readynez365 plattformen gir en forbedret digital vei for alle læringselementene dine, fra forberedelse til eksamen, noe som gjør den til den mest direkte veien til nye tekniske ferdigheter. Velg hva du vil (og trenger) for å gjøre deg klar. Det hele er forberedt for deg i Readynez365 i god tid før kursene dine.

Opplæring designet for det virtuelle klasserommet

Treningsmetodikken er designet for det virtuelle klasserommet, med fokus på å inspirere og engasjere deg med en blanding av praktisk opplæring, presentasjoner, tekniske laboratorier og tester. Du vil også være glad for å vite at virtuell trening er elsket av ledere – det er den mest kostnadseffektive måten å trene på.

Veiledning fra ekspertene vil få deg rett i mål

Det er et maksimalt antall deltakere i teamet for å sikre deg enkel tilgang til personlig coaching. Du vil møte akkrediterte ekspertinstruktører som er erfarne IT-fagfolk og konsulenter som er sertifisert til høyeste nivå og som bringer den virkelige verden inn i undervisningen.

Eksamen og kompetansefokus

Vi dekker alle detaljene slik at du kan bruke det i ditt daglige arbeid, og du vil til og med lære detaljene du trenger å vite til eksamen. Det er ditt valg om du vil gå opp til eksamen eller ikke, men med våre detaljerte eksamensveiledninger og hotline gjør vi det enkelt å få tilgang til eksamensbeviset ditt og planlegge og fullføre eksamen online

Sertifiseringsgaranti

Din tilgang til trening er ubegrenset, og du kan trene så mye du vil frem til du består eksamen.

Bærekraftig læring – tren med god samvittighet

Tren med god samvittighet med kurs som gir 96 % lavere CO2-avtrykk sammenlignet med trening i klasserommet. Organisasjonen vår opererer med minimal miljøpåvirkning og vi har redusert våre CO2-utslipp med 96 % siden 2019. Vi overholder ISO 14001 gjennom hele forsyningskjeden vår som din garanti for våre bærekraftige kurs.


Hva Du Vil Lære På Vårt CCSP Kurs

- Cloud Computing Definitions
- Cloud Computing Roles (e.g., cloud service customer, cloud service provider, cloud service partner, cloud service broker)
- Key Cloud Computing Characteristics (e.g., on-demand self-service, broad network access, multi-tenancy, rapid elasticity and scalability, resource pooling, measured service)
- Building Block Technologies (e.g., virtualization, storage, networking, databases, orchestration)

- Cloud Computing Activities
- Cloud Service Capabilities (e.g., application capability types, platform capability types, infrastructure capability types)
- Cloud Service Categories (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))
- Cloud Deployment Models (e.g., public, private, hybrid, community)
- Cloud Shared Considerations (e.g., interoperability, portability, reversibility, availability, security, privacy, resiliency, performance, governance, maintenance and versioning, service levels and Service Level Agreements (SLA), auditability, regulatory)
- Impact of Related Technologies (e.g., machine learning, artificial intelligence, blockchain, Internet of Things (IoT), containers, quantum computing)

- Cryptography and Key Management
- Access Control
- Data and Media Sanitization (e.g., overwriting, cryptographic erase)
- Network Security (e.g., network security groups)
- Virtualization Security (e.g., hypervisor security, container security)
- Common Threats

- Cloud Secure Data Lifecycle
- Cloud based Disaster Recovery (DR) and Business Continuity (BC) planning
- Cost Benefit Analysis
- Functional Security Requirements (e.g., portability, interoperability, vendor lock-in)
- Security Considerations for Different Cloud Categories (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))

- Verification Against Criteria (e.g., International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27017, Payment Card Industry Data Security Standard (PCI DSS))
- System/subsystem Prod

- Cloud Data Life Cycle Phases
- Data Dispersion

- Storage Types (e.g. long term, ephemeral, raw-disk)
- Threats to Storage Types

- Encryption and Key Management
- Hashing
- Masking
- Tokenization
- Data Loss Prevention (DLP)
- Data Obfuscation
- Data De-identification (e.g., anonymization)

- Structured Data
- Unstructured Data

- Mapping
- Labeling
- Sensitive data (e.g., Protected Health Information (PHI), Personally Identifiable Information (PII), card holder data)

- Objectives (e.g., data rights, provisioning, access models)
- Appropriate Tools (e.g., issuing and revocation of certificates)

- Data Retention Policies
- Data Deletion Procedures and Mechanisms
- Data Archiving Procedures and Mechanisms
- Legal Hold

- Definition of Event Sources and Requirement of Identity Attribution
- Logging, Storage and Analysis of Data Events
- Chain of Custody and Non-repudiation

- Physical Environment
- Network and Communications
- Compute
- Virtualization
- Storage
- Management Plane

- Logical Design (e.g., tenant partitioning, access control)
- Physical Design (e.g. location, buy or build)
- Environmental Design (e.g., Heating, Ventilation and Air Conditioning (HVAC), multi-vendor pathway connectivity

- Risk Assessment and Analysis
- Cloud Vulnerabilities, Threats and Attacks
- Virtualization Risks
- Counter-measure Strategies

- Physical and Environmental Protection (e.g., on-premise)
- System and Communication Protection
- Virtualization Systems Protection
- Identification, Authentication and Authorization in Cloud Infrastructure
- Audit Mechanisms (e.g., log collection, packet capture)

- Risks Related to the Cloud Environment
- Business Requirements (e.g., Recovery Time Objective (RTO), Recovery Point Objective (RPO), Recovery Service Level (RSL))
- Business Continuity/Disaster Recovery Strategy
- Creation, Implementation and Testing of Plan

- Cloud Development Basics
- Common Pitfalls
- Common Cloud Vulnerabilities

- Business Requirements
- Phases and Methodologies

- Avoid Common Vulnerabilities During Development
- Cloud-specific Risks
- Quality Assurance
- Threat Modeling
- Software Configuration Management and Versioning

- Functional Testing
- Security Testing Methodologies

- Approved Application Programming Interfaces (API)
- Supply-chain Management
- Third Party Software Management
- Validated Open Source Software

- Supplemental Security components (e.g., Web Application Firewall (WAF), Database Activity Monitoring (DAM), Extensible Markup Language (XML) firewalls, Application Programming Interface (API) gateway)
- Cryptography
- Sandboxing
- Application Virtualization and Orchestration

- Federated Identity
- Identity Providers
- Single Sign-On (SSO)
- Multi-factor Authentication
- Cloud Access Security Broker (CASB)

- Hardware Specific Security Configuration Requirements (e.g., Basic Input Output System (BIOS), settings for virtualization and Trusted Platform Module (TPM), storage controllers, network controllers)
- Installation and Configuration of Virtualization Management Tools
- Virtual Hardware Specific Security Configuration Requirements (e.g., network, storage, memory, Central Processing Unit (CPU))
- Installation of Guest Operating System (OS) Virtualization Toolsets

- Configure Access Control for Local and Remote Access (e.g., Secure Keyboard Video Mouse (KVM), console-based access mechanisms, Remote Desktop Protocol (RDP))
- Secure Network Configuration (e.g., Virtual Local Area Networks (VLAN), Transport Layer Security (TLS), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Virtual Private Network (VPN))
- Operating System (OS) Hardening Through the Application of Baselines (e.g., Windows, Linux, VMware)
- Availability of Stand-Alone Hosts
- Availability of Clustered Hosts (e.g., Distributed Resource Scheduling (DRS), Dynamic Optimization (DO), storage clusters, maintenance mode, High Availability)
- Availability of Guest Operating System (OS)

- Access Controls for Remote Access (e.g., Remote Desktop Protocol (RDP), Secure Terminal Access, Secure Shell (SSH))
- Operating System (OS) Baseline Compliance Monitoring and Remediation
- Patch Management
- Performance and Capacity Monitoring (e.g., network, compute, storage, response time)
- Hardware Monitoring (e.g., Disk, Central Processing Unit (CPU), fan speed, temperature)
- Configuration of Host and Guest Operating System (OS) Backup and Restore Functions
- Network Security Controls (e.g., firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), honeypots, vulnerability assessments, network security groups)
- Management Plane (e.g., scheduling, orchestration, maintenance)

- Change Management
- Continuity Management
- Information Security Management
- Continual Service Improvement Management
- Incident Management
- Problem Management
- Release Management
- Deployment Management
- Configuration Management
- Service level Management
- Availability Management
- Capacity Management

- Forensic Data Collection Methodologies
- Evidence Management
- Collect, Acquire and Preserve Digital Evidence

- Vendors
- Customers
- Partners
- Regulators
- Other Stakeholders

- Security Operations Center (SOC)
- Monitoring of Security Controls (e.g., firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), honeypots, vulnerability assessments, network security groups)
- Log Capture and Analysis (e.g., Security Information and Event Management (SIEM), log management)
- Incident Management

- Conflicting International Legislation
- Evaluation of Legal Risks Specific to Cloud Computing
- Legal Framework and Guidelines
- eDiscovery (e.g., International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27050, Cloud Security Alliance (CSA) Guidance)
- Forensics Requirements

- Difference Between Contractual and Regulated Private Data (e.g., Protected Health Information (PHI), Personally Identifiable Information (PII))
- Country-Specific Legislation Related to Private Data (e.g., Protected Health Information (PHI), Personally Identifiable Information (PII))
- Jurisdictional Differences in Data Privacy
- Standard Privacy Requirements (e.g., International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27018, Generally Accepted Privacy Principles (GAPP), General Data Protection Regulation (GDPR))

- Internal and External Audit Controls
- Impact of Audit Requirements
- Identify Assurance Challenges of Virtualization and Cloud
- Types of Audit Reports (e.g., Statement on Standards for Attestation Engagements (SSAE), Security Operations Center (SOC), International Standard on Assurance Engagements (ISAE))
- Restrictions of Audit Scope Statements (e.g., Statement on Standards for Attestation Engagements (SSAE), International Standard on Assurance Engagements (ISAE))
- Gap Analysis
- Audit Planning
- Internal Information Security Management System (ISMS)
- Internal Information Security Controls System
- Policies (e.g., organizational, functional, cloud computing)
- Identification and Involvement of Relevant Stakeholders
- Specialized Compliance Requirements for Highly-Regulated Industries (e.g., North American Electric Reliability Corporation/ Critical Infrastructure Protection (NERC/CIP), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry (PCI))
- Impact of Distributed Information Technology (IT) Model (e.g., diverse geographical locations and crossing over legal jurisdictions)

- Assess Providers Risk Management Programs (e.g., controls, methodologies, policies)
- Difference Between Data Owner/Controller vs. Data Custodian/Processor (e.g., risk profile, risk appetite, responsibility)
- Regulatory Transparency Requirements (e.g., breach notification, Sarbanes-Oxley (SOX), General Data Protection Regulation (GDPR))
- Risk Treatment (i.e., avoid, modify, share, retain)
- Different Risk Frameworks
- Metrics for Risk Management
- Assessment of Risk Environment (e.g., service, vendor, infrastructure)

- Business Requirements (e.g., Service Level Agreement (SLA), Master Service Agreement (MSA), Statement of Work (SOW))
- Vendor Management
- Contract Management (e.g., right to audit, metrics, definitions, termination, litigation, assurance, compliance, access to cloud/data, cyber risk insurance)
- Supply-Chain Management (e.g., International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27036)


Møt Våre Instruktører

Møt noen av instruktørene du kan møte på kurset ditt. De er eksperter, lidenskapelig opptatt av yrket sitt og dedikert til å gi kunnskapen sin tilbake til industrien, yrket og de som ønsker å lære, utforske og fremme karrieren.

Kevin Henry
Kevin Henry
#(ISC)2 #ISACA #Infosec

Kevin Henry er en globalt anerkjent ekspert som i over 20 år har bidratt til opplæring og sertifisering av mennesker innen IT-sikkerhet, inkludert CISSP, CISM, CISA og andre.

Friedhelm Düsterhöft
Friedhelm Düsterhöft
#Dataprivacy #Infosec #ISO

Friedhelm har mer enn 30 års erfaring innen IT, sikkerhet og personvern som senior informasjonssikkerhetskonsulent.

James Rowney (1)
James Rowney
#(ISC)2 #TOGAF #Infosec

James Rowney er en velkjent ekspert med over 20 års bidrag til opplæring av IT-sikkerhetsferdigheter.


Hvordan Du Best Kan Forberede Deg Til Vårt CCSP Kurs

Our course participants come from varied backgrounds and have different attributes.

To make sure you have the best possible chances of benefitting from the course, we are available for you to discuss your goals and general expectations to your learning and results.

However, in order to fully benefit from this course, you must have a minimum of five years of experience in IT, three of which must be in information security, with one year in cloud computing.

You should also be able to demonstrate capabilities in each of the six CBK domains:

- Architectural Concepts & Design Requirements
- Cloud Data Security
- Cloud Platform and Infrastructure Security
- Cloud Application Security
- Operations
- Legal and Compliance

Please note: You can substitute (ISC)2’s CISSP certification for the entire CCSP experience prerequisites.


Våre Resultater

Med 15 års erfaring og mer enn 40 000 fornøyde kunder fra hele verden, stoler organisasjoner som ALSO, ATEA, Microsoft, Serco og mange flere på at Readynez trener og sertifiserer sine ansatte.

  • Topprangerte kurs, med flest deltakere som scoret kurset 10/10
  • 40 000 deltakere trent og sertifisert
  • Globalt anerkjente ekspertinstruktører, hvorav mange er MVP
  • Betrodd leverandør av store opplæringsprosjekter for mange store organisasjoner

Dette er bare noen av de mange organisasjonene som stoler på Readynez

ALSO Logo 400 200 Atea (Company) Logo1 Microsoft Logo Serco Logo

Andre Har også Deltatt På

ISACA CISM Certification

Å oppnå ISACA CISM sertifiseringen er ikke en lett oppgave, men med ditt Readynez kurs og Learning Program har vi gjort alt vi kan for å støtte deg fra start til slutt, og sikre at du har de optimale forutsetningene for å lykkes. Dette inkluderer de beste ressursene som er tilgjengelige for å hjelpe deg med å forberede deg, inkludert relevante online kurs, Practice Test for eksamensforberedelser, study guides, eksamensstøtte og veiledninger osv., alt gjort lett tilgjengelig for deg i vår Learning Platform. Velger du vårt Virtual Training-alternativ, bidrar du også til en mer bærekraftig verden med en reduksjon i CO2-utslipp på 96% sammenlignet med alternativet i klasserommet.

SE KURS
(ISC)2 CISSP - Certified Information Systems Security Professional

CISSP er gullstandarden for IT-sikkerhetseksperter. Den forblir på toppen av sertifiseringer og er et krav for et flertall av senior IT-sikkerhetsroller. Å oppnå CISSP sertifiseringen er ikke en lett oppgave, men med ditt Readynez kurs og Learning Program har vi gjort alt vi kan for å støtte deg fra start til slutt, og sikre at du har de optimale forutsetningene for å lykkes. Dette inkluderer de beste ressursene som er tilgjengelige for å hjelpe deg med å forberede deg, inkludert relevante online kurs, tilgang til praktiske labs, Practice Test for eksamensforberedelser, study guides, eksamensstøtte og veiledninger osv., alt gjort lett tilgjengelig for deg i vår Learning Platform. Velger du vårt Virtual Training-alternativ, bidrar du også til en mer bærekraftig verden med en reduksjon i CO2-utslipp på 96% sammenlignet med alternativet i klasserommet.

SE KURS

FAQ - THE CCSP CERTIFIED CLOUD SECURITY PROFESSIONAL COURSE

The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.

Your exam voucher is usually included in your virtual training package. When you´re ready to sit your exam, you just book it with the exam provider. You can sit most exams from home or at a local test centre. We’re here to help you with that process.

Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.

Your Readynez Course package includes the exam voucher for Microsoft exams, AWS exams, ISO Exams and almost every other exam.

With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.

Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at info@readynez.com.

The CCSP is a globally recognized certification for the highest level of expertise in cloud security. As a result, it was co-created by the leading stewards for information security and cloud computing security, the Cloud Security Alliance (CSA).

In order to earn this certification, you must have a deep understanding of cloud security architecture, design, operations, and service orchestration.

Cloud security architects, designers, operators, and orchestrators with the CCSP credential have demonstrated their ability to apply industry best practices to all aspects of cloud security. It demonstrates that you're at the cutting edge of cloud security.

Security professionals who successfully complete the Certified Cloud Security Professional (CCSP) exam are recognized as experts in their field. The CCSP exam is designed to ensure that cloud security professionals have the required knowledge, skills and abilities in cloud security design, implementation, architecture, operations, controls and compliance with regulatory frameworks.

The ideal candidates are more senior IT architects and security professionals, including engineers, and the must hold a minimum of five years of experience in IT, three of which must be in information security, with one year in cloud computing. The candidate should also be able to demonstrate capabilities in each of the six CBK domains (see below in “What is the syllabus for the CCSP Certification”).

The CCSP exam costs $599, and costs are comparable in local currencies in the European Union and the United Kingdom.

To achieve the CCSP certification, please consider the following:

  • Candidates must have a cumulative total of five years of paid, full-time work experience in information technology
  • Three years must be spent in information security, and one year must be spent in one or more of the CCSP Common Body of Knowledge's six domains (CBK).
  • Earning the CISSP credential from (ISC)2 can be used to satisfy the entire CCSP experience requirement

Your CCSP certification is valid for a period of three years. The member must, however, continue to complete certain standards in order to keep his or her certification active and effective.

Typical job roles for people holding this certification are;

  • Security Administrator
  • Security Consultant
  • Security Engineer
  • Security Architect
  • Security Manager
  • Systems Engineer
  • Systems Architect
  • Enterprise Architect

The syllabus for the CCSP exam includes the following domains:

  • Cloud Concepts, Architecture and Design
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Cloud Security Operations
  • Legal, Risk and Compliance

Kurv

{{item.CourseTitle}}

Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}