CCSP Certification

Course Overview

Gain expertise in cloud security architecture, design, applications, and operations with this CCSP online training certification course. You will receive step-by-step guidance and an easy-to-follow, detailed lesson plan regarding every facet of CCSP, helping you accelerate your career in the growing field of cloud security.

What you'll learn

100% Money Back Guarantee
No questions asked refund*

At It Nuggets Online, we value the trust of our patrons immensely. But, if you feel that a course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!
  • Learn Research
  • Collect Usefull Data
  • Requirement Analysis Phase
  • Market competent Skills
  • Problem Solving Skills
  • Model Implementation Skills
  • Building or Developing Phase
  • Presenting and Testing Skills

    Course Includes:

  • 7+ hours on-demand video
  • 7+ articles
  • 20+ downloadable resources
  • Full access
  • Access on mobile and TV
  • Certificate of completion


Whether you work for a small company, a large corporate or from home, a computer will be one of the first pieces of office equipment you’re going to need. And they comes in different forms, such as laptops and desktops. Computer skills are a valuable addition to any employee’s personal portfolio. Upskilling and polishing your computer literacy can greatly increase your desirability to employers. This is the perfect opportunity to take on roles you might not have previously considered. As an employer, motivating your employees to become computer literate will increase productivity and also stave off problems that can cost time and significant amounts of money. Many companies have started to depend upon computerised technology to get work done. Which is why computer skills have become increasingly important. Having the necessary and basic computer course knowledge will put you a step ahead of others. You’ll have a big advantage over those who aren’t computer literate. It’s for this specific reason that many schools and tertiary institutions encourage students to complete basic computer studies. Here are three reasons why being computer literate is beneficial in the workplace.

Helping professionals thrive, not just survive

Learning — Blended to Perfection

Learning — Blended to Perfection

Learning — Blended to Perfection

Course Inquiry


Annual Salary

Hiring Companies

Training Options


Enroll Now
  • Lifetime access to high-quality self-paced eLearning content curated by industry experts
  • 4 hands-on projects to perfect the skills learnt
  • 2 simulation test papers for self-assessment
  • 24x7 learner assistance and support


Enroll Now
  • Everything in Self-Paced Learning, plus
  • 90 days of flexible access to online classes
  • Live, online classroom training by top instructors and practitioners
  • 24x7 learner assistance and support


  • Blended learning delivery model (self-paced e-learning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support
  • 24x7 learner assistance and support

Course Curriculum


This online CCSP certification course is ideal for anyone wishing to learn and explore career opportunities in IT network security and cloud computing. This course also is ideal for enterprise architects, security administrators, systems engineers, security architects, security consultants, security engineers, security managers, and system architects.


To obtain the CCSP certification course, you must have:? At least five years of working experience in IT, including three years of information security and one year of cloud security experience?? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Those without the required experience can take the exam to become an Associate of (ISC)? while working toward the experience needed for full certification

Course Content

Lesson 1 - Course Introduction
1.1 CCSP Certification Overview
1.2 Course Objectives
Lesson 2 - Cloud Concepts, Architecture, and Design
1.01 Cloud Concepts, Architecture, and Design
1.02 Security Concepts
1.03 Key Security Concepts, Defense in Depth, Due Care, and Due Dilligence
1.04 Security Controls and Functionalities
1.05 Cloud Computing Concepts
1.06 Business Drivers
1.07 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
1.08 Cloud Computing Concepts Advantages
1.09 Cloud Reference Architecture
1.10 Cloud Computing Roles and Actors
1.11 Cloud Service Categories Infrastructure as a Service (IaaS)
1.12 Cloud Service Categories Platform as a Service (PaaS)
1.13 Cloud Service Categories Software as a Service (SaaS)
1.14 Cloud Service Categories Management
1.15 Cloud Deployment Models: Public Cloud
1.16 Cloud Deployment Models: Private Cloud
1.17 Cloud Deployment Models: Hybrid Cloud
1.18 Cloud Deployment Models: Community Cloud
1.19 Models and Characteristics
1.20 Comparison of Cloud Deployment Models
1.21 Case Study: Hybrid Cloud
1.22 Cloud Technology Roadmap
1.23 Impact of Related Technologies
1.24 Cryptography
1.25 Key Management
1.26 IAM and Access Control
1.27 Data Remanence
1.28 Virtualization
1.29 Common Threats
1.30 Design Principles of Secure Cloud Computing
1.31 Cost-Benefit Analysis
1.32 Evaluate Cloud Service Providers
1.33 SOC
1.34 IT Security Evaluation
1.35 FIPS
1.36 Scenario
1.37 Key Takeaways
Knowledge Check
Lesson 3 - Cloud Data Security
2.01 Cloud Data Security
2.02 Cloud Data Life Cycle
2.03 Cloud Data Life Cycle: Create, Store, Use, and Share
2.04 Real-World Scenario
2.05 Cloud Data Life Cycle: Archive
2.06 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
2.07 Cloud Data Storage Architectures
2.08 Cloud Data Storage Architectures: Storage Types for IaaS
2.09 Cloud Data Storage Architectures: Storage Types for PaaS
2.10 Cloud Data Storage Architectures: Storage Types for SaaS
2.11 Cloud Data Storage Architectures: Threats to Storage Types
2.12 Real-World Scenario
2.13 Data Security Strategies
2.14 Data Security Strategies: Encryption (Use Cases)
2.15 Data Security Strategies: Encryption Challenges
2.16 Data Security Strategies: Encryption in IaaS
2.17 Data Security Strategies: Database Encryption
2.18 Data Security Strategies: Key Management
2.19 Data Security Strategies: Key Storage in the Cloud
2.20 Data Security Strategies: Masking
2.21 Data Security Strategies: Data Anonymization
2.22 Data Security Strategies: Tokenization
2.23 Data Security Strategies: Homomorphic Encryption and Bit Splitting
2.24 Real-World Scenario
2.25 Data Security Strategies: Data Loss Prevention
2.26 Scenario
2.27 Data Discovery and Classification Technology
2.28 Data Discovery and Classification Technology: Data Classification
2.29 Data Discovery and Classification Technology: Challenges With Cloud Data
2.30 Jurisdictional Data Protections for Personally Identifiable Information (PII)
2.31 Privacy Acts: GDPR
2.32 Privacy Acts: GDPR Data Protection Principles
2.33 Privacy Acts: United States
2.34 Privacy Acts: HIPAA, FISMA, and SOX
2.35 Jurisdictional Data Protections for PII: Responsibilites of Cloud Services
2.36 Data Rights Management
2.37 Data Retention, Deletion, and Archiving Policies
2.38 Data Retention
2.39 Data Deletion
2.40 Real-World Scenario
2.41 Data Archiving
2.42 Real-World Scenario
2.43 Legal Hold
2.44 Auditability, Traceability, and Accountability of Data Events
2.45 SIEM
2.46 Chain of Custody
2.47 Nonrepudation
2.48 Real-World Scenario
2.49 Key Takeaways
Knowledge Check
Lesson 4 - Cloud Platform and Infrastructure Security
3.01 Cloud Platform and Infrastructure Security
3.02 Cloud Infrastructure Components
3.03 Network and Communications
3.04 Management Plane and Virtualization
3.05 Factors That Impact Data Center Design
3.06 Physical Design: Buy or Build
3.07 Physical Design: Data Center Design Standards
3.08 Physical Design: Uptime Institute
3.09 Physical Design: Tiers
3.10 Physical Design Features of Tiers
3.11 Real-World Scenario
3.12 Environmental Design Considerations
3.13 Connectivity
3.14 Hypervisor and Resource Allocation
3.15 Risks Associated with Cloud Infrastructure
3.16 Policy General and Virtualization Risks
3.17 Cloud-Specific Legal and Non-Cloud Specific Risks
3.18 Cloud Attack Vectors and Compensating Controls
3.19 Business Scenario
3.20 Design and Plan Security Controls
3.21 Real-World Scenario
3.22 Plan Disaster Recovery and Business Continuity
3.23 Real-World Scenario
3.24 BCDR Planning Factors and Disruptive Events
3.25 Characteristics of Cloud Infrastructure
3.26 BCDR strategies and Returning to Normal
3.27 Real-World Scenario
3.28 BCDR Creation
3.29 BCDR Creation: Test
3.30 Business Requirements
3.31 BCDR Creation: Report and Revise
3.32 Testing Types, Uptime, Availability, Activity, and Case Study
3.33 Security Training and Awareness
3.34 Real-World Scenario
3.35 Key Takeaways
Knowledge Check
Lesson 5 - Cloud Application Security
4.01 Cloud Application Security
4.02 Advocate Training and Awareness for Application Security
4.03 Real-World Scenario
4.04 Common Pitfalls
4.05 Encryption Dependency Awareness
4.06 Business Scenario
4.07 Understanding Software Development Lifecycle Process
4.08 Real-World Scenario
4.09 Vulnerabilities and Risks
4.10 Threat Modeling
4.11 Real-World Scenario
4.12 Encryption
4.13 Sandboxing and Application Virtualization
4.14 Federated Identity Management
4.15 SAML Authentication
4.16 Identity and Access Management
4.17 Multi-Factor Authentication
4.18 Real-World Scenario
4.19 Cloud Access Security Broker
4.20 Application Security Testing
4.21 Software Supply Chain Management
4.22 Real-World Scenario
4.23 Key Takeaways
Knowledge Check
Lesson 6 - Cloud Security Operations
5.01 Cloud Security Operations
5.02 Secure Configuration of Hardware: Servers
5.03 Secure Configuration of Hardware: Storage Controllers
5.04 Real-World Scenario
5.05 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription
5.06 Secure Configuration of Hardware: Virtual Switches
5.07 Configuration of VM Tools
5.08 Configuration of VM Tools Running a Physical Infrastructure: Legal, Compatibility, Control, and Log Data
5.09 Configuration of VM Tools Running a Physical Infrastructure: PCI DSS Access, Upgrades and Changes, and Failover Technology
5.10 Configuration of VM Tools Running a Physical Infrastructure: Compliance, Regulations, and Outsourcing
5.11 Configuration of VM Tools Running a Physical Infrastructure: Placement of Security, Virtualization, VM
5.12 Real-World Scenario
5.13 Securing Network Configuration
5.14 Real-World Scenario
5.15 Clustered Hosts
5.16 Dynamic Optimization and Clustered Storage
5.17 Maintenance Mode and Patch Management
5.18 Performance Monitoring
5.19 Real-World Scenario
5.20 Network Security Controls: Layered Security and Honeypots
5.21 Network Security Controls: SIEM
5.22 Log Management
5.23 Orchestration
5.24 Availability of Guest OS
5.25 Operations Management: Part One
5.26 Real-World Scenario
5.27 Operations Management: Part Two
5.28 Risk Management Process: Framing Risk and Risk Assessment
5.29 Quantitative Risk Analysis
5.30 Scenario
5.31 Risk Response and Risk Monitoring
5.32 Collection and Preservation of Digital Evidence
5.33 Communication with Relevant Parties
5.34 Real-World Scenario
5.35 Security Operations Center
5.36 Key Takeaways
Knowledge Check
Lesson 7 - Legal Risk and Compliance
6.01 Legal, Risk, and Compliance
6.02 Case Study
6.03 Legislative Concepts
6.04 Intellectual Property Laws
6.05 Case Study
6.06 Business Scenario
6.07 Acts and Agreements
6.08 Case Study
6.09 NERC
6.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP)
6.11 Jurisdictional Differences in Data Privacy
6.12 Terminologies and eDiscovery
6.13 Forensic Requirements and PII
6.14 Gap Analysis, SOC Reports, and Chain of Custody
6.15 Vendor Management
6.16 Cloud Computing Policies and Risk Attitude
6.17 SLA
6.18 Quality of Service
6.19 Risk Mitigation
6.20 Risk Management Metrics and ISO Standard
6.21 Real-World Scenario
6.22 Key Takeaways
Knowledge Check

Course Training Session FAQ'S

IT Nuggets Online is a progressive IT company engaged in creating eye-grabbing computer-based content in English, for the benefit of students. we offer learning process that blends texts, visuals, animation, video clips, and sound to give a complete learning experience to students.
Everyone Take an Online Classes in Your Flexible Times.
Yes, You Can Enroll More Than Courses.
After Meeting the Certification Criteria Explained By Instructor which will be contain some quiz and hands on exercise then definitely you will get certification.