CCSP : Managing Cloud Security

Managing Cloud Security
ISBN : 978-1-61691-862-0
Gain hands-on expertise in (ISC)² CCSP exam with CCSP - Managing Cloud Security course. The course provides complete coverage of CCSP exam and includes topics such as architectural concepts & design requirements, cloud data security, cloud platform & infrastructure security, cloud application, security, operations, legal & compliance. The CCSP credential provides professionals with deep-seated knowledge and competency derived from experience with cyber, information, software and cloud computing infrastructure security.


uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keeps the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keeps learners engaged and makes learning fun.

Here's What You Get

Exercises Flashcards Quizzes Glossary

Each lesson comes with Exercises, Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts. Glossary defines the key terms.

Exercise Questions
Glossary of terms
Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.


Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests
Post-Assessments Questions


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

Exam Information

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge. The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)² Certified Information Systems Security Professional (CISSP) and CSA’s Certificate of Cloud Security Knowledge (CCSK).

Prepare for the following certification

Career Prospects
  • Security Engineer
  • Security Manager
  • Security Architect
  • Systems Architect
  • Systems Engineer
  • Enterprise Architect  
  • Security Consultant
  • Security Administrator
Exam FAQs
What are the prerequisites for this exam?
Applicants must have a minimum five years of  working experience in information technology, of which three years must be in information security and one year in one of the six CBK domains.
What is the exam registration fee?
USD 549
Where do I take the exam?
How many questions are asked in the exam?
The exam contains 125 questions.
What is the duration of the exam?
240 minutes
Where can I find more information about this exam?
To know more about the CCSP, click here.

Table of Content

Here's What you will Learn

Lesson 1: Introduction

  • Conventions

Lesson 2: Domain 1: Architectural Concepts and Design Requirements

  • Introduction
  • Cloud Computing Definitions
  • Cloud Computing Roles
  • Key Cloud Computing Characteristics
  • Cloud Transition Scenario
  • Building Blocks
  • Cloud Computing Functions
  • Cloud Service Categories
  • Cloud Deployment Models
  • Cloud Cross-Cutting Aspects
  • Network Security and Perimeter
  • Cryptography
  • IAM and Access Control
  • Data and Media Sanitization
  • Virtualization Security
  • Common Threats
  • Security Considerations for Different Cloud Categories
  • Open Web Application Security Project Top Ten Security Threats
  • Cloud Secure Data Lifecycle
  • Information and Data Governance Types
  • Business Continuity and Disaster Recovery Planning (BCDR)
  • Cost-Benefit Analysis
  • Certification Against Criteria
  • System and Subsystem Product Certification
  • Summary

Lesson 3: Domain 2: Cloud Data Security

  • Introduction
  • The Cloud Data Lifecycle Phases
  • Location and Access of Data
  • Functions, Actors, and Controls of the Data
  • Cloud Services, Products, and Solutions
  • Data Storage
  • Relevant Data Security Technologies
  • Application of Security Strategy Technologies
  • Emerging Technologies
  • Data Discovery
  • Data Classification
  • Data Privacy Acts
  • Typical Meanings for Common Privacy Terms
  • Privacy Roles for Customers and Service Providers
  • Responsibility Depending on the Type of Cloud Services
  • Implementation of Data Discovery
  • Classification of Discovered Sensitive Data
  • Mapping and Definition of Controls
  • Privacy Level Agreement
  • PLA Versus Essential P&DP Requirements Activity
  • Application of Defined Controls for PII
  • Data Rights Management Objectives
  • Data-Protection Policies
  • Events
  • Supporting Continuous Operations
  • Chain of Custody and Nonrepudiation
  • Summary

Lesson 4: Domain 3: Cloud Platform and Infrastructure Security

  • Introduction
  • Network and Communications in the Cloud
  • The Compute Parameters of a Cloud Server
  • Storage Issues in the Cloud
  • Management of Cloud Computing Risks
  • Countermeasure Strategies Across the Cloud
  • Physical and Environmental Protections
  • System and Communication Protections
  • Virtualization Systems Controls
  • Managing Identification, Authentication, and Authorization in the Cloud Infrastructure
  • Risk Audit Mechanisms
  • Understanding the Cloud Environment Related to Business Continuity and Disaster Recovery (BCDR)
  • Understanding the Business Requirements Related to BCDR
  • Understanding the BCDR Risks
  • BCDR Strategies
  • Creating the BCDR Plan
  • Summary

Lesson 5: Domain 4: Cloud Application Security

  • Introduction
  • Determining Data Sensitivity and Importance
  • Understanding the API Formats
  • Common Pitfalls of Cloud Security Application Deployment
  • Awareness of Encryption Dependencies
  • Understanding the Software Development Lifecycle Process for a Cloud Environment
  • Assessing Common Vulnerabilities
  • Cloud-Specific Risks
  • Threat Modeling
  • Identity and Access Management
  • Federated Identity Management
  • Multifactor Authentication
  • Supplemental Security Devices
  • Cryptography
  • Tokenization
  • Data Masking
  • Sandboxing
  • Application Virtualization
  • Cloud-Based Functional Data
  • Cloud-Secure Development Lifecycle
  • Application Security Testing
  • Summary

Lesson 6: Domain 5: Operations

  • Introduction
  • Modern Data Centers and Cloud Service Offerings
  • Factors That Affect Data Center Design
  • Enterprise Operations
  • Secure Configuration of Hardware: Specific Requirements
  • Installation and Configuration of Virtualization Management Tools for the Host
  • Securing the Network Configuration
  • Identifying and Understanding Server Threats
  • Using Standalone Hosts
  • Using Clustered Hosts
  • Accounting for Dynamic Operation
  • Using Storage Clusters
  • Using Maintenance Mode
  • Providing High Availability (HA) on the Cloud
  • The Physical Infrastructure for Cloud Environments
  • Configuring Access Control for Remote Access
  • Performing Patch Management
  • Performance Monitoring
  • Backing Up and Restoring the Host Configuration
  • Implementing Network Security Controls: Defense in Depth
  • Developing a Management Plan
  • Building a Logical Infrastructure for Cloud Environments
  • Running a Logical Infrastructure for Cloud Environments
  • Managing the Logical Infrastructure for Cloud Environments
  • Implementation of Network Security Controls
  • Using an ITSM Solution
  • Considerations for Shadow IT
  • Operations Management
  • Managing Risk in Logical and Physical Infrastructures
  • The Risk-Management Process Overview
  • Understanding the Collection and Preservation of Digital Evidence
  • Managing Communications with Relevant Parties
  • Wrap-Up: Data Breach Example
  • Summary

Lesson 7: Domain 6: Legal and Compliance

  • Introduction
  • International Legislation Conflicts
  • Legislative Concepts
  • Frameworks and Guidelines Relevant to Cloud Computing
  • Common Legal Requirements
  • Legal Controls and Cloud Service Providers
  • e-Discovery
  • Cloud Forensics and ISO/IEC 27050-1
  • Protecting Personal Information in the Cloud
  • Auditing in the Cloud
  • Standard Privacy Requirements (ISO/IEC 27018)
  • GAPP
  • Internal Information Security Management System (ISMS)
  • Implementing Policies
  • Identifying and Involving the Relevant Stakeholders
  • Impact of Distributed IT Models
  • Understanding the Implications of the Cloud to Enterprise Risk Management
  • Risk Mitigation
  • Understanding Outsourcing and Contract Design
  • Business Requirements
  • Vendor Management
  • Cloud Computing Certification
  • Contract Management
  • Supply Chain Management
  • Summary

Lesson 8: Appendix A: Helpful Resources and Links


uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved