Certified Cloud Security Officer (CCSO) – Perfil

Esquema Detallado del Curso

  • Course Introduction
    • Cloud introduction and Design Fundamentals
    • Cloud Introduction o Including deep dive into the virtualization layer
    • Cloud and Business Objetives Meet as One
    • Cloud Security from A-Z
    • Design Doctrines
    • How do we find Trusted Cloud Services?
  • Data Security in the Cloud
    • Data Life Cycle
    • Data Storage Designs for the Cloud
    • Strategies for Designing Data Security
    • Data Discovery and Classification Technologies
    • Understanding Jurisdictional Data Protection for Personally Identifiable Information (PII)
    • All about Data Rights Management
    • Data Retention, Deletion, and Archival Policies
    • Auditability, Traceability, and Accountability of Data Events
  • The Basis for Cloud Security and surrounding Environment
    • Understanding Cloud Infrastructure Components
    • Analyze Risks in the Cloud Infrastructure
    • Security Control Design for the Cloud
    • Disaster Recovery and Business Continuity Management for the Cloud
  • Application Security in the Cloud
    • Training and Awareness for Application Security
    • Software Development Life Cycle (SDLC) Process
    • Learning to apply the Secure Software Development Life Cycle
    • Verifying the use of Secure Software
    • Proper use of Identity and Access Management (IAM) Solutions
    • Additional components used in the Cloud Application Architecture
    • Software Assurance and Validation
  • Managing Cloud Security
    • Supporting the Data Center Design
    • Physical Infrastructure for the Cloud
    • Running the Physical Infrastructure
    • Managing the Physical Infrastructure
    • Building the Logical
    • Infrastructure for the Cloud
    • Running the Logical
    • Infrastructure for the Cloud
    • Managing the Logical
    • Infrastructure for the Cloud
    • Maintaining Compliance with Regulations and Controls
    • Conducting Risk Assessment for the Logical and Physical Infrastructure
    • Properly plan for the Collection, Acquisition and Preservation of Digital Evidence
    • Managing Communications with Relevant Parties
  • Legal Issues, Auditing, and Compliance
    • Discussionh the Legal Requirements and Risks Unique to the Cloud
    • Privacy Issues and the relevance of Jurisdiction
    • The Audit Process and Methodologies for the Cloud
    • Cloud to enterprise Risk Management
    • Contract design for Outsourcing and Cloud Agreements
    • Managing Vendors in the Cloud
  • Labs-These are not all required during class but will be leveraged to better understand the complexities in cloud security. This is a general list, not a complete list of every lab.
    • Cloud Migration Evaluation
    • Understanding the virtual layer, hacking included
    • Understanding how network traffic routes in the virtual and cloud layer
    • Harden the virtual layer Management layer, Hypervisor and the VMs.
    • Setup and Deploy an IaaS Solution
    • Setup SaaS Solution
    • Setup PaaS Solution
    • Evaluate SaaS, PaaS, and IaaS solutions for security capabilities
    • Cloud Business Driver Audit
    • Service Level Agreement Exercise
    • Identity and Access Control Management
    • Encryption and Key Management
    • Small Scope Private Cloud Security Audit