Program Highlights
The CCSK v5 Training covers cloud computing concepts, governance strategies, risk management, and audit processes. This latest version of the CCSK program includes identity and access management, security monitoring, infrastructure and network security, and cloud workload security. Participants will also learn data, application security strategies, and incident response best practices. The CCSK Orb chatbot supports this program, combining theoretical knowledge with practical insights for continuous learning and assistance.
- 24-Hour of Instructor-led Training
- CSA Authorized Training Partner
- Learn with Real-world Scenarios
- Highly Interactive and Dynamic Sessions
- Immersive Learning
- Learn from Industry Experts
- Career Guidance and Mentorship
- Extended Post Training Support
- Access to Recorded Sessions
Learning Schedule
- upcoming classes
- corporate training
- 1 on 1 training
08 Feb - 23 Mar | Online | Weekday | 09:00 - 12:00 IST | BATCH OPEN |
Why Choose Our Corporate Training Solution
- Upskill your team on the latest tech
- Highly customized solutions
- Free Training Needs Analysis
- Skill-specific training delivery
- Secure your organizations inside-out
Why Choose 1-on-1 Training
- Get personalized attention
- Customized content
- Learn at your dedicated hour
- Instant clarification of doubt
- Guaranteed to run
Can't Find a Suitable Schedule? Talk to Our Training Advisor
Unlock your potential in cloud security with the CCSK v5 Training & Certification. This comprehensive program provides a vendor-neutral understanding of cloud security, covering essential topics like cloud computing concepts, cloud governance, risk management, identity and access management, security monitoring, infrastructure and networking, data and application security, and incident response. The course emphasizes practical application and real-world scenarios, making it perfect for both newcomers and seasoned professionals. With up-to-date content reflecting the latest industry standards, the training equips you with the knowledge and confidence to master the CCSK v5 Certification exam and advance your career in cloud security.
Domain 1: Cloud Computing Concepts & Architectures
- Introduction
- Learning Objectives
- 1.1 Defining Cloud Computing
- 1.1.1 Abstraction & Orchestration
- 1.2 Cloud Computing Models
- 1.2.1 Essential Characteristics
- 1.2.2 Cloud Service Models
- 1.2.2.1 Infrastructure as a Service (IaaS)
- 1.2.2.2 Platform as a Service (PaaS)
- 1.2.2.3 Software as a Service (SaaS)
- 1.2.3 Cloud Deployment Models
- 1.2.4 CSA Enterprise Architecture Model
- 1.3 Cloud Security Scope, Responsibilities, & Models
- 1.3.1 Shared Security Responsibility Mode
Domain 2: Cloud Governance
- Introduction
- Learning Objectives
- 2.1. Cloud Governance
- 2.2 The Governance Hierarchy
- 2.2.1 Cloud Security Frameworks
- 2.2.2 Policies
Domain 3: Risk, Audit, & Compliance
- Introduction
- Learning Objectives
- 3.1. Cloud Risk Management
- 3.1.1 Cloud Risks
- 3.1.2 Understanding Cloud Risk Management
- 3.1.3 Assessing Cloud Services
- 3.1.4 The Cloud Register
- 3.2 Compliance & Audit
- 3.2.1 Jurisdictions
- 3.2.2 Cloud-Relevant Laws & Regulations Examples
- 3.2.3 Compliance Inheritance
- 3.2.4 Artifacts of Compliance
- 3.3 Governance, Risk, Compliance Tools & Technologies
Domain 4: Organization Management
- Introduction
- Learning Objectives
- 4.1 Organization Hierarchy Models
- 4.1.1 Definitions
- 4.1.2 Organization Capabilities Within a Cloud Service Provider
- 4.1.3 Building a Hierarchy Within a Provider
- 4.2 Managing Organization-Level Security Within a Provider
- 4.2.1 Identity Provider & User/Group/Role Mappings
- 4.2.2 Common Organization Shared Services
- 4.3 Considerations for Hybrid & Multi-Cloud Deployments
- 4.3.1 Organization Management for Hybrid Cloud Security
- 4.3.2 Organization Management for Multi-Cloud Security
- 4.3.3 Organization Management for SaaS Hybrid & Multi-Cloud
Domain 5: Identity & Access Management
- Introduction
- Learning Objectives
- 5.1 Fundamental Terms
- 5.2 Federation
- 5.2.1 Common Federation Standards
- 5.2.2 How Federated Identity Management Works
- 5.2.3 Managing Users & Identities for Cloud Computing
- 5.3 Strong Authentication & Authorization
- 5.3.1 Authentication & Credentials
- 5.3.2 Entitlement & Access Management
- 5.3.3 Privileged User Management
Domain 6: Security Monitoring
- Introduction
- Learning Objectives
- 6.1 Cloud Monitoring
- 6.1.1 Logs & Events
- 6.2 Beyond Logs – Posture Management
- 6.3 Cloud Telemetry Sources
- 6.3.1 Management Plane Logs
- 6.3.2 Service & Application Logs
- 6.3.3 Resource Logs
- 6.3.4 Cloud Native Tools
- 6.4 Collection Architectures
- 6.4.1 Log Storage & Retention
- 6.4.2 Cascading Log Architecture
- 6.5 AI for Security Monitoring
Domain 7: Infrastructure & Networking
- Introduction
- Learning Objectives
- 7.1 Cloud Infrastructure Security
- 7.1.1 Foundational Infrastructure Security Techniques
- 7.1.2 CSP Infrastructure Security Responsibilities
- 7.1.3 Infrastructure Resilience
- 7.2 Cloud Network Fundamentals
- 7.2.1 Cloud Networks are Software-Defined Networks
- 7.2.2 Cloud Connectivity
- 7.3 Cloud Network Security & Secure Architecture
- 7.3.1 Preventative Security Measures
- 7.3.2 Detective Security Measures
- 7.4 Infrastructure as Code (IaC)
- 7.5 Zero Trust for Cloud Infrastructure & Networks
- 7.5.1 Software-Defined Perimeter & ZT Network Access
- 7.6 Secure Access Service Edge (SASE)
Domain 8: Cloud Workload Security
- Introduction
- Learning Objectives
- 8.1 Introduction to Cloud Workload Security
- 8.1.1 Types of Cloud Workloads
- 8.1.2 Impact on Workload Security Controls
- 8.2 Securing Virtual Machines
- 8.2.1 Virtual Machine Challenges & Mitigations
- 8.2.2 Creating Secure VM Images with Factories
- 8.2.3 Snapshots & Public Exposures/Exfiltration
- 8.3 Securing Containers
- 8.3.1 Container Image Creation
- 8.3.2 Container Networking
- 8.3.3 Container Orchestration & Management Systems
- 8.3.4 Container Orchestration Security
- 8.3.5 Runtime Protection for Containers
- 8.4 Securing Serverless and Function as a Service
- 8.4.1 FaaS Security Issues
- 8.4.2 IAM for Serverless
- 8.4.3 Environment Variables & Secrets
- 8.5 Securing AI Workloads
- 8.5.1 AI-System Threats
- 8.5.2 AI Risk Mitigation and Shared Responsibilities
Domain 9: Data Security
- Introduction
- Learning Objectives
- 9.1 Primer on Cloud Storage
- 9.1.1 Volume/Block Storage
- 9.1.2 Object Storage
- 9.1.3 Database Storage
- 9.1.4 Other Types of Storage
- 9.2 Data Security Tools and Techniques
- 9.2.1 Data Classification
- 9.2.2 Identity and Access Management
- 9.2.3 Access Policies
- 9.2.4 Encryption and Key Management
- 9.2.5 Data Loss Prevention
- 9.3 Cloud Data Encryption at Rest
- 9.3.1 Cloud Data Key Management Strategies
- 9.3.2 Data Encryption Recommendations
- 9.4 Data Security Posture Management
- 9.5 Object Storage Security
- 9.6 Data Security for Artificial Intelligence
- 9.6.1 AI as a Service
Domain 10: Application Security
- Introduction
- Learning Objectives
- 10.1 Secure Development Lifecycle
- 10.1.1 SDLC Stages
- 10.1.2 Threat Modeling
- 10.1.3 Testing: Pre-Deployment
- 10.1.4 Testing: Post Deployment
- 10.2 Architecture’s Role in Secure Cloud Applications
- 10.2.1 Cloud Impacts on Architecture-Level Security
- 10.2.2 Architectural Resilience
- 10.3 Identity & Access Management and Application Security
- 10.3.1 Secrets Management
- 10.4 Dev Ops & DevSecOps
Domain 11: Incident Response & Resilience
- Introduction
- Learning Objectives
- 11.1 Incident Response
- 11.1.1 Incident Response Lifecycle
- 11.2 Preparation
- 11.2.1 Incident Response Preparation & Cloud Service Providers
- 11.2.2 Training for Cloud Incident Responders
- 11.3 Detection & Analysis
- 11.3.1 Cloud Impact on Incident Response Analysis
- 11.3.2 Cloud System Forensics
- 11.4 Containment, Eradication, & Recovery
- 11.4.1 Containment
- 11.4.2 Eradication
- 11.4.3 Recovery
- 11.5 Post Incident Analysis
Domain 12: Related Technologies & Strategies
- Introduction
- Learning Objectives
- 12.1 Zero Trust
- 12.1.1 Technical Objectives of Zero Trust
- 12.1.2 Zero Trust Pillars & Maturity Model
- 12.1.3 Zero Trust & Cloud Security
- 12.2 Artificial Intelligence
- 12.2.1 Characteristics of AI Workloads
- Next Steps.
- IT Professionals
- Developers
- IT Operations
- Audit Compliance/Managers
- No official experience is required; however, it is highly recommended to have a basic understanding of security fundamentals, including firewalls, secure development, encryption, and identity and access management.
Certification Name | Certificate of Cloud Security Knowledge (CCSK v5) |
Exam Format | Multiple-choice questions |
Number of Questions | 60 |
Exam Duration | 120 minutes |
Passing Score | 80% |
Open/Close Book Exam | Open Book Exam |
Language | English, Spanish, and Japanese |
- Define cloud computing, set baseline terminology, and detail controls, deployment, and architectural models.
- Focus on cloud security, risk management, audit processes, and compliance. Evaluate service providers and establish risk registries.
- Manage and secure the entire cloud footprint, including service provider deployments.
- Understand and manage IAM between organizations, cloud providers, and services.
- Address monitoring challenges, integrate advanced tools, and manage cloud telemetry and logs.
- Secure software and data units deployable on various infrastructures or platforms.
- Apply strategies, tools, and practices to protect data in transit and at rest.
- Develop best practices for incident response and resilience in cloud environments.
- Understand and apply Zero Trust and AI in strategic cybersecurity approaches.
How We Help You Succeed
Vision
Goal
Skill-Building
Mentoring
Direction
Support
Success
Career Transformation
Projected increase in roles related to cloud security and governance over the next decade.
Risk Reduction: Organizations adopting CCSK-certified professionals report significant improvements
of Organizations: Plan to hire professionals skilled in cloud security with CCSK certification for various IT operations.
of Organizations: Committed to training existing staff on cloud security best practices and governance using the CCSK framework.
Technology
Healthcare
Retail
Government
Manufacturing
Finance
Your Trusted Instructors
18+ Years Of Experience
Words Have Power
The sessions were very good! The CCSK course at InfosecTrain provided engaging content and valuable insights that enhanced my understanding of the subject. Overall, it was a great learning experience.
The course content was excellent, but extending the course duration would be beneficial to provide more clarity on the CCSK examination. Overall, the training at InfosecTrain was highly valuable and contributed significantly to my understanding.
The sessions were excellent, with the trainer being very interactive throughout. The trainer demonstrated strong knowledge of cloud concepts, which greatly enhanced the learning experience during the CCSK course at InfosecTrain.
I have attended two trainings from InfosecTrain, and both experiences were excellent. The trainer demonstrated deep knowledge of all topics covered and effectively addressed students’ questions in a clear and simple manner. Overall, I had a great learning experience with the CCSK course and appreciate the quality of training provided.
The course was excellent and greatly helped me understand security concepts. I appreciate the quality of training provided by InfosecTrain in the CCSK course.
Success Speaks Volumes
Get a Sample Certificate
Frequently Asked Questions
What is the CCSK v5 Certification?
The Certificate of Cloud Security Knowledge (CCSK) v5 is a globally recognized certification that provides a comprehensive and vendor-neutral understanding of cloud security principles, best practices, and standards.
Why should I pursue CCSK v5 Certification Training?
Pursuing CCSK v5 Certification Training enhances your cloud security expertise, showcases your skills to employers, and keeps you current with the latest industry trends and best practices, making you a valuable asset in the IT field.
What are the prerequisites for CCSK v5 Certification Training?
No official experience is required; however, it is highly recommended to have a basic understanding of security fundamentals, including firewalls, secure development, encryption, and identity and access management.
How long does it take to complete the CCSK v5 Certification Training?
The CCSK v5 Certification Training is 24 hours.
What topics are covered in the CCSK v5 Certification Training?
The training covers cloud computing concepts, cloud governance, risk management, audit and compliance, organization management, identity and access management, security monitoring, infrastructure and networking, cloud workload security, data security, application security, incident response, resilience, and related technologies like Zero Trust and AI.
How is the CCSK v5 Certification Exam structured?
The exam is an open-book, online exam consisting of 60 multiple-choice questions to be completed within 120 minutes. The minimum passing score is 80%.
What are the benefits of obtaining the CCSK v5 Certification?
The benefits include:
- Gain comprehensive cloud security knowledge
- Close the skills gap in evolving cybersecurity
- Adapt to AI advancements and open infrastructure
- Receive vendor-neutral education
- Acquire actionable skills for modern challenges
- Earn industry recognition and credibility
- Benefit from expert-driven, up-to-date content
- Enhance professional growth and communication skills
- Enable strategic decision-making
- Align with industry best practices and benchmarks
Can I take the CCSK v5 Certification Exam online?
Yes, the CCSK v5 Certification Exam can be taken online.
Is there a difference between CCSK v5 and previous versions?
Yes, CCSK v5 includes substantial updates to align with modern cloud security practices, new Zero Trust and AI content, a restructured domain framework, and more comprehensive coverage of essential topics.
How can I prepare for the CCSK v5 Certification Exam?
Prepare using the CCSK Prep-Kit, study guide, self-paced or instructor-led training from InfosecTrain, and practice exams. For additional learning support, utilize the CCSK Orb chatbot.
What job roles benefit from CCSK v5 Certification?
Roles that benefit include security professionals, developers, IT operations staff, auditors, governance, risk management and compliance professionals, executives, and decision-makers involved in cloud computing and security.
How often is the CCSK v5 Certification updated?
The CCSK Certification is periodically updated to reflect the latest advancements and best practices in cloud security.
Are there continuing education requirements for maintaining CCSK v5 Certification?
There are no formal continuing education requirements, but it is recommended that you stay updated with the latest cloud security trends and best practices through ongoing learning and professional development.