
CCSP Certification
This Certified Cloud Security Professional (CCSP) training course is the leading certification by (ISC)². This course will enable you to negate security threats to your cloud storage by understanding information security risks and implementing strategies to maintain data security.
CCSP Certification
Gain expertise in cloud security architecture, design, applications, and operations with this CCSP online training certification course. You will receive step-by-step guidance and an easy-to-follow, detailed lesson plan regarding every facet of CCSP, helping you accelerate your career in the growing field of cloud security.
Training Key Features
- 50 hours of blended learning
- Lifetime access to self-paced learning
- Industry-recognized course completion certificate
- 7 real-world case studies
- Exam Voucher Included
- Exam Pass Guarantee
Skills Covered
- Cloud computing concepts
- Cloud architecture and design
- Cloud infrastructure security
- Cloud data lifecycle
- Cloud application security
- Vulnerabilities and risk
- Threat modeling
- Encryption
- Cloud security operations
- Risk management and analysis
- Disaster recovery
- Business continuity
Benefits
Cloud computing is poised to grow at least 6.5 times annually and the demand for cloud services will continue to grow by 22% per year through 2020. The annual salary of a principal information security professional ranges from $135,000–$190,000 (Source: Glassdoor).



Training Options
SELF-PACED LEARNING
- Lifetime access to high-quality self-paced e-learning content curated by industry experts.
- 24x7 learner assistance and support.
No exam voucher.
ONLINE BOOTCAMP
- 90 days of flexible access to online classes
- Lifetime access to high-quality self-paced e-learning content and live class recordings
- 24x7 learner assistance and support
Exam voucher Included.
Course Curriculum
- 1.1 CCSP Certification Overview
- 1.2 Course Objectives
- 2.1 Cloud Concepts, Architecture, and Design
- 2.2 Security Concepts
- 2.3 Key Security Concepts, Defense in Depth, Due Care, and Due Dilligence
- 2.4 Security Controls and Functionalities
- 2.5 Cloud Computing Concepts
- 2.6 Business Drivers
- 2.7 Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
- 2.8 Cloud Computing Concepts Advantages
- 2.9 Cloud Reference Architecture
- 2.10 Cloud Computing Roles and Actors
- 2.11 Cloud Service Categories Infrastructure as a Service (IaaS)
- 2.12 Cloud Service Categories Platform as a Service (PaaS)
- 2.13 Cloud Service Categories Software as a Service (SaaS)
- 2.14 Cloud Service Categories Management
- 2.15 Cloud Deployment Models: Public Cloud
- 2.16 Cloud Deployment Models: Private Cloud
- 2.17 Cloud Deployment Models: Hybrid Cloud
- 2.18 Cloud Deployment Models: Community Cloud
- 2.19 Models and Characteristics
- 2.20 Comparison of Cloud Deployment Models
- 2.21 Case Study: Hybrid Cloud
- 2.22 Cloud Technology Roadmap
- 2.23 Impact of Related Technologies
- 2.24 Cryptography
- 2.25 Key Management
- 2.26 IAM and Access Control
- 2.27 Data Remanence
- 2.28 Virtualization
- 2.29 Common Threats
- 2.30 Design Principles of Secure Cloud Computing
- 2.31 Cost-Benefit Analysis
- 2.32 Evaluate Cloud Service Providers
- 2.33 SOC
- 2.34 IT Security Evaluation
- 2.35 FIPS
- 2.36 Scenario
- 2.37 Key Takeaways
- Knowledge Check
- 3.1 Cloud Data Security
- 3.2 Cloud Data Life Cycle
- 3.3 Cloud Data Life Cycle: Create, Store, Use, and Share
- 3.4 Real-World Scenario
- 3.5 Cloud Data Life Cycle: Archive
- 3.6 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
- 3.7 Cloud Data Storage Architectures
- 3.8 Cloud Data Storage Architectures: Storage Types for IaaS
- 3.9 Cloud Data Storage Architectures: Storage Types for PaaS
- 3.10 Cloud Data Storage Architectures: Storage Types for SaaS
- 3.11 Cloud Data Storage Architectures: Threats to Storage Types
- 3.12 Real-World Scenario
- 3.13 Data Security Strategies
- 3.14 Data Security Strategies: Encryption (Use Cases)
- 3.15 Data Security Strategies: Encryption Challenges
- 3.16 Data Security Strategies: Encryption in IaaS
- 3.17 Data Security Strategies: Database Encryption
- 3.18 Data Security Strategies: Key Management
- 3.19 Data Security Strategies: Key Storage in the Cloud
- 3.20 Data Security Strategies: Masking
- 3.21 Data Security Strategies: Data Anonymization
- 3.22 Data Security Strategies: Tokenization
- 3.23 Data Security Strategies: Homomorphic Encryption and Bit Splitting
- 3.24 Real-World Scenario
- 3.25 Data Security Strategies: Data Loss Prevention
- 3.26 Scenario
- 3.27 Data Discovery and Classification Technology
- 3.28 Data Discovery and Classification Technology: Data Classification
- 3.29 Data Discovery and Classification Technology: Challenges With Cloud Data
- 3.30 Jurisdictional Data Protections for Personally Identifiable Information (PII)
- 3.31 Privacy Acts: GDPR
- 3.32 Privacy Acts: GDPR Data Protection Principles
- 3.33 Privacy Acts: United States
- 3.34 Privacy Acts: HIPAA, FISMA, and SOX
- 3.35 Jurisdictional Data Protections for PII: Responsibilites of Cloud Services
- 3.36 Data Rights Management
- 3.37 Data Retention, Deletion, and Archiving Policies
- 3.38 Data Retention
- 3.39 Data Deletion
- 3.40 Real-World Scenario
- 3.41 Data Archiving
- 3.42 Real-World Scenario
- 3.43 Legal Hold
- 3.44 Auditability, Traceability, and Accountability of Data Events
- 3.45 SIEM
- 3.46 Chain of Custody
- 3.47 Nonrepudation
- 3.48 Real-World Scenario
- 3.49 Key Takeaways
- Knowledge Check
- 4.1 Cloud Platform and Infrastructure Security
- 4.2 Cloud Infrastructure Components
- 4.3 Network and Communications
- 4.4 Management Plane and Virtualization
- 4.5 Factors That Impact Data Center Design
- 4.6 Physical Design: Buy or Build
- 4.7 Physical Design: Data Center Design Standards
- 4.8 Physical Design: Uptime Institute
- 4.9 Physical Design: Tiers
- 4.10 Physical Design Features of Tiers
- 4.11 Real-World Scenario
- 4.12 Environmental Design Considerations
- 4.13 Connectivity
- 4.14 Hypervisor and Resource Allocation
- 4.15 Risks Associated with Cloud Infrastructure
- 4.16 Policy General and Virtualization Risks
- 4.17 Cloud-Specific Legal and Non-Cloud Specific Risks
- 4.18 Cloud Attack Vectors and Compensating Controls
- 4.19 Business Scenario
- 4.20 Design and Plan Security Controls
- 4.21 Real-World Scenario
- 4.22 Plan Disaster Recovery and Business Continuity
- 4.23 Real-World Scenario
- 4.24 BCDR Planning Factors and Disruptive Events
- 4.25 Characteristics of Cloud Infrastructure
- 4.26 BCDR strategies and Returning to Normal
- 4.27 Real-World Scenario
- 4.28 BCDR Creation
- 4.29 BCDR Creation: Test
- 4.30 Business Requirements
- 4.31 BCDR Creation: Report and Revise
- 4.32 Testing Types, Uptime, Availability, Activity, and Case Study
- 4.33 Security Training and Awareness
- 4.34 Real-World Scenario
- 4.35 Key Takeaways
- Knowledge Check
- 5.1 Cloud Application Security
- 5.2 Advocate Training and Awareness for Application Security
- 5.3 Real-World Scenario
- 5.4 Common Pitfalls
- 5.5 Encryption Dependency Awareness
- 5.6 Business Scenario
- 5.7 Understanding Software Development Lifecycle Process
- 5.8 Real-World Scenario
- 5.9 Vulnerabilities and Risks
- 5.10 Threat Modeling
- 5.11 Real-World Scenario
- 5.12 Encryption
- 5.13 Sandboxing and Application Virtualization
- 5.14 Federated Identity Management
- 5.15 SAML Authentication
- 5.16 Identity and Access Management
- 5.17 Multi-Factor Authentication
- 5.18 Real-World Scenario
- 5.19 Cloud Access Security Broker
- 5.20 Application Security Testing
- 5.21 Software Supply Chain Management
- 5.22 Real-World Scenario
- 5.23 Key Takeaways
- Knowledge Check
- 6.1 Cloud Security Operations
- 6.2 Secure Configuration of Hardware: Servers
- 6.3 Secure Configuration of Hardware: Storage Controllers
- 6.4 Real-World Scenario
- 6.5 Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription
- 6.6 Secure Configuration of Hardware: Virtual Switches
- 6.7 Configuration of VM Tools
- 6.8 Configuration of VM Tools Running a Physical Infrastructure: Legal, Compatibility, Control, and Log Data
- 6.9 Configuration of VM Tools Running a Physical Infrastructure: PCI DSS Access, Upgrades and Changes, and Failover Technology
- 6.10 Configuration of VM Tools Running a Physical Infrastructure: Compliance, Regulations, and Outsourcing
- 6.11 Configuration of VM Tools Running a Physical Infrastructure: Placement of Security, Virtualization, VM
- 6.12 Real-World Scenario
- 6.13 Securing Network Configuration
- 6.14 Real-World Scenario
- 6.15 Clustered Hosts
- 6.16 Dynamic Optimization and Clustered Storage
- 6.17 Maintenance Mode and Patch Management
- 6.18 Performance Monitoring
- 6.19 Real-World Scenario
- 6.20 Network Security Controls: Layered Security and Honeypots
- 6.21 Network Security Controls: SIEM
- 6.22 Log Management
- 6.23 Orchestration
- 6.24 Availability of Guest OS
- 6.25 Operations Management: Part One
- 6.26 Real-World Scenario
- 6.27 Operations Management: Part Two
- 6.28 Risk Management Process: Framing Risk and Risk Assessment
- 6.29 Quantitative Risk Analysis
- 6.30 Scenario
- 6.31 Risk Response and Risk Monitoring
- 6.32 Collection and Preservation of Digital Evidence
- 6.33 Communication with Relevant Parties
- 6.34 Real-World Scenario
- 6.35 Security Operations Center
- 6.36 Key Takeaways
- Knowledge Check
- 7.1 Legal, Risk, and Compliance
- 7.2 Case Study
- 7.3 Legislative Concepts
- 7.4 Intellectual Property Laws
- 7.5 Case Study
- 7.6 Business Scenario
- 7.7 Acts and Agreements
- 7.8 Case Study
- 7.9 NERC
- 7.10 Privacy Shield and Generally Accepted Privacy Principles (GAPP)
- 7.11 Jurisdictional Differences in Data Privacy
- 7.12 Terminologies and eDiscovery
- 7.13 Forensic Requirements and PII
- 7.14 Gap Analysis, SOC Reports, and Chain of Custody
- 7.15 Vendor Management
- 7.16 Cloud Computing Policies and Risk Attitude
- 7.17 SLA
- 7.18 Quality of Service
- 7.19 Risk Mitigation
- 7.20 Risk Management Metrics and ISO Standard
- 7.21 Real-World Scenario
- 7.22 Key Takeaway
- Knowledge Check
Exams and Certifications
The content of the CCSP exam has been refreshed to reflect the most common issues cloud security professionals face, along with the best practices for mitigating those issues. Some topics have been updated while others have been realigned. The result is an exam that more accurately reflects the knowledge and hands-on experience with cloud security architecture, design, operations, and service orchestration.
Previous CCSP Domain Name
Domain 1: Architectural Concepts & Design Requirements
Domain 2: Cloud Data Security
Domain 3: Cloud Platform and Infrastructure Security
Domain 4: Cloud Application Security
Domain 5: Operations
Domain 6: Legal & Compliance
New CCSP Domain Name
Domain 1: Cloud Concepts, Architecture, and Design
Domain 2: Cloud Data Security
Domain 3: Cloud Platform and Infrastructure Security
Domain 4: Cloud Application Security
Domain 5: Cloud Security Operations
Domain 6: Legal Risk and Compliance
The cumulative scoring weight of each area is also changing.
Domain 1: Cloud Concepts, Architecture, and Design – 17%
Domain 2: Cloud Data Security – 19%
Domain 3: Cloud Platform and Infrastructure Security – 17%
Domain 4: Cloud Application Security – 17%
Domain 5: Cloud Security Operations – 7%
Domain 6: Legal, Risk, and Compliance – 13%
The changes are effective beginning August 1, 2019.
How much does the CCSP certification exam cost?
The CCSP exam consists of 125 multiple-choice questions. To pass the exam, you will need to have a minimum passing score of at least 700/1000 (or 70 percent) in order to gain your certification.
Refreshed CCSP exams are available only in English.
To unlock your certificate from Simplilearn, you must complete 85 percent of the self-paced learning and successfully pass the course end assessment with a score of 70 percent or above.

Training FAQ
CCSP is an acronym that stands for; Certified Cloud Security Professional. This certification validates your advanced skills and knowledge in the ability to design, manage, and safeguard data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the Cyber Security experts at (ISC)².
Benefits of being CCSP-Certified are:
- Increases career visibility and credibility
- The certification creates job security and new job opportunities
- Allows you to gain versatile vendor-neutral skills that can be applied to different technologies and methodologies
- Gain access to a global community of like-minded cybersecurity leaders
- Be better prepared to stem cyber attacks and inspire a safe and secure cyber world
- On average, (ISC)² members report earning 35% more than non-members
To obtain the CCSP certification course, you must have at least five years of working experience in IT including three years of information security and one year of cloud security experience. Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification.
All of our highly qualified instructors are industry experts with years of relevant industry experience working with front-end development technology. Each one has gone through a rigorous selection process that includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating remain on our faculty. All trainers are also practitioners in the field which they teach assuring that you are learning from someone with real-world, industry experience.
The tools you’ll need to attend the CCSP Course are:
- Windows: Windows XP SP3 or higher
- Mac: OSX 10.6 or higher
- Internet speed: Preferably 512 Kbps or higher
- Headset, speakers, and microphone: You’ll need headphones or speakers to hear instructions clearly, as well as a microphone to talk to other professionals learning alongside you. You can use a headset with a built-in microphone, or separate speakers and microphone based upon your preference.
You can enroll in this training on our website and make an online payment using any of the following options:
- Visa Credit or Debit Card
- MasterCard
- American Express
- Diner’s Club
- PayPal
Once payment is received, you will automatically receive a payment receipt and access information via email.
Yes, you can cancel your enrollment if necessary. We will refund the course price after deducting an administration fee. To learn more, you can view our refund policy
*Free exam retake terms and conditions:
Terms and Conditions:
Simplilearn offers Exam Pass Guarantee to our students who complete our course training. Simplilearn uses top learning methodologies to equip learners with the knowledge and confidence to pass the CCSP exam in the first attempt. If you do not pass the CCSP exam at the first attempt, Simplilearn will provide you one free exam retake.
To ensure your success, we strongly recommend that you take the CCSP exam within a week of the course completion date—or a maximum of 45 days from the completion of the online training. This way, the course materials will be fresh in your mind.
CCSP Exam Attempts:
Attempt Time Frame Result Free Exam Retake
First Within 6 months Did Not Pass Yes
(180 days) from
enrollment date
Exam Pass Guarantee:
If you do not pass the exam on the first attempt, Simplilearn will provide you one free exam retake. You must submit a copy of your scorecard.
Terms and Conditions for qualifying:
This money-back guarantee applies only to Simplilearn’s CCSP blended learning. The guarantee is valid only for participants who have paid the entire enrollment fee.
The guarantee becomes void if:
- Participants do not take the CCSP examination within 45 days of unlocking the certificate.
- Participants do not maintain 100% attendance during the training sessions.
- Participants fail to score at least 80% in at least 2 simulation tests available at lms.Simplilearn.com
- Participants fail to book their exam within 6 months from the date of enrollment
- Participants do not follow the instructions of the trainer and do not complete the exercises given during the training.
- Participants do not submit the required documents to Simplilearn.
- Participants failed to request a refund within 15 days of receiving their results
You can become a cloud security architect by understanding what cloud security is and its application. It is better to implement project-specific learning and begin to understand cloud security architecture and design. Simplilearn's CCSP certification is an excellent starting point when you want your career to reach the next level.
Cloud security is basically used to establish a set of policies, procedures, controls, and technologies with an aim to protect cloud-based data, systems, and infrastructure. It is designed to prevent unauthorized access to the data and applications in the cloud and secure them from emerging cybersecurity threats. Take our CCSP course if you want to start a promising career in cloud security.
Our CCSP course is designed by industry experts who also have rich teaching experience. They explain everything step-by-step and even beginners don’t find it difficult to follow.
McAfee has highlighted that one in four companies using public cloud services have experienced data threats and one in five have experienced an advanced attack against their public cloud infrastructure. With 97% of organizations using cloud services across the world, cloud security has become a necessity and many job opportunities are emerging in this field. With a CCSP certification, you can successfully step into this career field.
Beginners can participate in a CCSP training program to understand the course modules in detail. It helps them effectively pass the examination and get rid of exam preparation stress. In addition, they will be guided by a professional instructor on the certification exam. Beginners can also use the CCSP training material to get success in this examination.
The CCSP is a globally recognized credential that helps you build your career and better secure crucial assets in the cloud. It showcases your advanced technical skills and knowledge to design, manage, and secure applications, data, and infrastructure in the cloud. Our CCSP training can help you achieve this valuable credential without much difficulty.
For CCSP holders, the most frequent employment positions include enterprise architect, security architect, systems engineer, security manager, and security consultant. CCSP certification is available to students seeking a future cloud security certificate because this is the only certification of more excellent value and importance than other certifications.
Cloud security architects identify threats to cloud systems, build new features that align with security needs, and design, maintain, and improve cloud-based systems. They put in a balanced set of controls for security technologies, processes, and the overall architecture. A CCSP certification is worth pursuing if you are seeking such a job role.
Cloud security architects are expected to have a sound knowledge of information security. They should be familiar with network and application security, cloud architecture, DevOps, ethical hacking, programming, and technology tools and platforms. A CCSP certification can help them become successful cloud security architects.
In all industries, including the government, media, transport, power, health, and more, CCSPs are vital members. CCSP certification is regarded as a reasonable measure of skill by most sectors. Our CCSP course enables you to achieve your dream career in any industry.
Cloud security architects, especially those with CCSP certification, are in high demand in firms like Google, Amazon, IBM, Salesforce, Microsoft, Oracle, and Accenture.
Some efficient self-study books besides CCSP training that prepare you for the CCSP examination and cover 100 percent of all examination fields include:
- CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide by Ben Malisow
- The Official (ISC)2 Guide to the CCSP CBK by Adam Gordon
- CCSP Certified Cloud Security Professional All-in-One Exam Guide by Daniel Carter
According to the (ISC)² Cybersecurity Workforce Study, the global average salary of professionals who hold a CCSP certification is $80,717. Here is the region-wise average salary (in USD):
- Asia-Pacific - $61,835
- Europe, Middle East & Africa - $78,548
- Latin America - $16,476
- North America - $114,172