Certified Cloud Security Officer (CCSO)

Being a Certified Cloud Security Officer (CCSO) validates that you are prepared to work with businesses to create and implement cloud based programs and security systems to ensure the success and safety of the business. In this course students will be introduced to Cloud Computing and Architectural concepts. They will learn about cloud risks, ERM and governance, legal implications, virtualization, managing information and security data, data center operations, interoperability and portability, traditional security, BCM and DR, incident response, application security, encryption and key management and more.

$950.00

Request More Information:

1
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right
FormCraft - WordPress form builder

Program Duration

10 Half-Days
40 Flex Classroom Hours

Instructor

 

Duane Anderson

Duane has been working in the IT industry for over two decades. He has primarily focused on security related matters such as Penetration Testing and Forensics. He has appeared as an expert witness in multiple court hearings on IT related matters. Duane has worked for or with most US and some foreign military branches, U.S government agencies, banking and regulatory industries and Fortune 500 companies. Duane contributed to the coordination and execution of IT counter-hacking & security courses for the US Marine Corps, US Army, US Air Force, U.S. Treasury, Sprint, IBM, Washington Mutual and Service Canada.

Course Outline

 
Chapter 00 – Course Introduction 
Chapter 01 – Introduction to Cloud Computing and Architectural Concepts 
Chapter 02 – Cloud Risks 
Chapter 03 – ERM and Governance 
Chapter 04 – Legal Implications 
Chapter 05 – Virtualization 
Chapter 06 – Managing Information and Securing Data 
Chapter 07 – Data Center Operations 
Chapter 08 – Interoperability and Portability 
Chapter 09 – Traditional Security 
Chapter 10 – BCM and DR 
Chapter 11 – Incident Response 
Chapter 12 – Application Security 
Chapter 13 – Encryption and Key Management 
Chapter 14 – Identity, Entitlement, and Access Management 
Chapter 15 – Auditing and Compliance 

Related Courses