Certificate of Cloud Security Knowledge (CCSK) + Zero Trust Training (ZTT)

Certificate of Cloud Security Knowledge (CCSK) + Zero Trust Training (ZTT)

This bundle includes the CCSK course and exam + FREE Introduction to Zero Trust Architecture course.

rate limit

Code not recognized.

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. 


Certificate of Cloud Security Knowledge (CCSK) - Exam Bundle + Zero Trust Training (ZTT)

This bundle includes the CCSK course and exam + FREE Introduction to Zero Trust Architecture course. 

With the CCSK course, you will learn how to develop a holistic cloud security program relative to globally accepted standards using the CSA Security Guidance V.4 and recommendations from ENISA. You will also be introduced to CSA’s governance, risk and compliance tool for the cloud - Cloud Controls Matrix (CCM). After completing this course you will receive a certificate for 16 course hours that can be submitted for possible CPE credits.

The exam bundle version of this course comes with an exam token and contains everything you need to train for and take the CCSK exam. It provides the most value for your money by providing a discount when you purchase the training and exam together.

The Introduction to Zero Trust Architecture provides an introduction to Zero Trust and Zero Trust Architecture. It covers foundational topics such as Zero Trust’s relevance, definitions, components, requirements, tenets, pillars, goals, objectives, and benefits. Learners will be introduced to planning considerations and implementation options for Zero Trust Architecture. Additionally, use cases are used to demonstrate how different topologies can work together to enhance security in environments assumed to be hostile. Diagrams, explanations, and references are provided to facilitate the learning process.

CurriculumTake Course

  • CCSK Foundation Introduction
  • Introduction to Your Learning Environment
  • Foundation Overview
  • Module 1 - Cloud Architecture
  • Unit 1 - Introduction to Cloud Computing
  • Unit 2 - Introduction & Cloud Architecture
  • Unit 3 - Cloud Essential Characteristics
  • Unit 4 - Cloud Service Models
  • Unit 5 - Cloud Deployment Models
  • Unit 6 - Shared Responsibilities
  • Module 2 - Infrastructure Security for Cloud
  • Unit 1 - Infrastructure Security for Cloud Computing
  • Unit 2 - Intro to Infrastructure Security for Cloud Computing
  • Unit 3 - Software Defined Networks
  • Unit 4 - Cloud Network Security
  • Unit 5 - Securing Compute Workloads
  • Unit 6 - Management Plane Security
  • Unit 7 - BCDR
  • Module 3 - Managing Cloud Security and Risk
  • Unit 1 - Managing Cloud Computing Security & Risk
  • Unit 2 - Governance
  • Unit 3 - Managing Cloud Security Risk
  • Unit 4 - Compliance
  • Unit 5 - Legal Consideration for Cloud
  • Unit 6 - Audit
  • Unit 7 - CSA Tools
  • Module 4 - Data Security For Cloud
  • Unit 1 - Module Introduction
  • Unit 2 - Cloud Data Storage
  • Unit 3 - Securing Data In The Cloud
  • Unit 4 - Encryption For IaaS
  • Unit 5 - Encryption For PaaS & SaaS
  • Unit 6 - Encryption Key Management
  • Unit 7 - Other Data Security Options
  • Unit 8 - Data Security Lifecycle
  • Module 5 - Securing Cloud Applications, Users and Related Technologies
  • Unit 1 - Module Introduction
  • Unit 2 - Secure Software Development Life Cycle (SSDLC)
  • Unit 3 - Testing & Assessment
  • Unit 4 - DevOps
  • Unit 5 - Secure Operations
  • Unit 6 - Identity & Access Management Definitions
  • Unit 7 - IAM Standards
  • Unit 8 - IAM In Practice
  • Module 6 - Cloud Security Operations
  • Unit 1 - Module Introduction
  • Unit 2 - Selecting A Cloud Provider
  • Unit 3 - Incident Response
  • Unit 4 - SECaaS Fundamentals
  • Unit 5 - SECaaS Categories & Recommendations
  • Unit 6 - Domain 14 Considerations
  • Unit 7 - CCSK Exam Preparation
  • Introduction to Zero Trust Architecture
  • Introduction to Zero Trust Architecture Study Guide
  • Introduction to Zero Trust Architecture
  • Definitions, Concepts, & Components of ZT
  • Objectives of Zero Trust
  • Benefits of Zero Trust
  • Planning Considerations ZTA
  • ZTA Implementation Examples
  • Zero Trust Use Cases

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. 


Certificate of Cloud Security Knowledge (CCSK) - Exam Bundle + Zero Trust Training (ZTT)

This bundle includes the CCSK course and exam + FREE Introduction to Zero Trust Architecture course. 

With the CCSK course, you will learn how to develop a holistic cloud security program relative to globally accepted standards using the CSA Security Guidance V.4 and recommendations from ENISA. You will also be introduced to CSA’s governance, risk and compliance tool for the cloud - Cloud Controls Matrix (CCM). After completing this course you will receive a certificate for 16 course hours that can be submitted for possible CPE credits.

The exam bundle version of this course comes with an exam token and contains everything you need to train for and take the CCSK exam. It provides the most value for your money by providing a discount when you purchase the training and exam together.

The Introduction to Zero Trust Architecture provides an introduction to Zero Trust and Zero Trust Architecture. It covers foundational topics such as Zero Trust’s relevance, definitions, components, requirements, tenets, pillars, goals, objectives, and benefits. Learners will be introduced to planning considerations and implementation options for Zero Trust Architecture. Additionally, use cases are used to demonstrate how different topologies can work together to enhance security in environments assumed to be hostile. Diagrams, explanations, and references are provided to facilitate the learning process.

CurriculumTake Course

  • CCSK Foundation Introduction
  • Introduction to Your Learning Environment
  • Foundation Overview
  • Module 1 - Cloud Architecture
  • Unit 1 - Introduction to Cloud Computing
  • Unit 2 - Introduction & Cloud Architecture
  • Unit 3 - Cloud Essential Characteristics
  • Unit 4 - Cloud Service Models
  • Unit 5 - Cloud Deployment Models
  • Unit 6 - Shared Responsibilities
  • Module 2 - Infrastructure Security for Cloud
  • Unit 1 - Infrastructure Security for Cloud Computing
  • Unit 2 - Intro to Infrastructure Security for Cloud Computing
  • Unit 3 - Software Defined Networks
  • Unit 4 - Cloud Network Security
  • Unit 5 - Securing Compute Workloads
  • Unit 6 - Management Plane Security
  • Unit 7 - BCDR
  • Module 3 - Managing Cloud Security and Risk
  • Unit 1 - Managing Cloud Computing Security & Risk
  • Unit 2 - Governance
  • Unit 3 - Managing Cloud Security Risk
  • Unit 4 - Compliance
  • Unit 5 - Legal Consideration for Cloud
  • Unit 6 - Audit
  • Unit 7 - CSA Tools
  • Module 4 - Data Security For Cloud
  • Unit 1 - Module Introduction
  • Unit 2 - Cloud Data Storage
  • Unit 3 - Securing Data In The Cloud
  • Unit 4 - Encryption For IaaS
  • Unit 5 - Encryption For PaaS & SaaS
  • Unit 6 - Encryption Key Management
  • Unit 7 - Other Data Security Options
  • Unit 8 - Data Security Lifecycle
  • Module 5 - Securing Cloud Applications, Users and Related Technologies
  • Unit 1 - Module Introduction
  • Unit 2 - Secure Software Development Life Cycle (SSDLC)
  • Unit 3 - Testing & Assessment
  • Unit 4 - DevOps
  • Unit 5 - Secure Operations
  • Unit 6 - Identity & Access Management Definitions
  • Unit 7 - IAM Standards
  • Unit 8 - IAM In Practice
  • Module 6 - Cloud Security Operations
  • Unit 1 - Module Introduction
  • Unit 2 - Selecting A Cloud Provider
  • Unit 3 - Incident Response
  • Unit 4 - SECaaS Fundamentals
  • Unit 5 - SECaaS Categories & Recommendations
  • Unit 6 - Domain 14 Considerations
  • Unit 7 - CCSK Exam Preparation
  • Introduction to Zero Trust Architecture
  • Introduction to Zero Trust Architecture Study Guide
  • Introduction to Zero Trust Architecture
  • Definitions, Concepts, & Components of ZT
  • Objectives of Zero Trust
  • Benefits of Zero Trust
  • Planning Considerations ZTA
  • ZTA Implementation Examples
  • Zero Trust Use Cases