Explore all aspects of cloud security to pass the CCSP exam and boost your career with this guide packed with use cases, mock exam questions, and tips. You'll be able to apply your new-found knowledge not only to pass the exam but also at work.

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
Sparen Sie mit 40% Rabatt auf 3 Monate Coursera Plus bei den Fähigkeiten, die Sie zum Strahlen bringen. Jetzt sparen
kurs ist nicht verfügbar in Deutsch (Deutschland)

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

Dozent: Packt - Course Instructors
Bei enthalten
Empfohlene Erfahrung
Empfohlene Erfahrung
Stufe „Fortgeschritten“
IT professionals and security analysts with a solid foundation in cloud technologies and cybersecurity.
Empfohlene Erfahrung
Empfohlene Erfahrung
Stufe „Fortgeschritten“
IT professionals and security analysts with a solid foundation in cloud technologies and cybersecurity.
Was Sie lernen werden
Understand the scope and objectives of the CCSP exam and how to register for it.
Develop expertise in securing application lifecycle and implementing IAM design principles.
Explore data protection measures, cloud governance strategies, and compliance frameworks.
Kompetenzen, die Sie erwerben
- Kategorie: Identity and Access ManagementIdentity and Access Management
- Kategorie: Cloud SecurityCloud Security
- Kategorie: Application SecurityApplication Security
- Kategorie: Cloud ServicesCloud Services
- Kategorie: IT Security ArchitectureIT Security Architecture
- Kategorie: Data SecurityData Security
- Kategorie: Threat ManagementThreat Management
- Kategorie: Data ManagementData Management
- Kategorie: Security ControlsSecurity Controls
- Kategorie: CybersecurityCybersecurity
- Kategorie: Security EngineeringSecurity Engineering
- Kategorie: Cloud DeploymentCloud Deployment
- Kategorie: CryptographyCryptography
- Kategorie: Cloud StandardsCloud Standards
- Kategorie: Security ManagementSecurity Management
- Kategorie: Disaster RecoveryDisaster Recovery
- Kategorie: Network SecurityNetwork Security
- Kategorie: Data GovernanceData Governance
- Kategorie: Cloud ComputingCloud Computing
- Kategorie: Cloud Computing ArchitectureCloud Computing Architecture
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufügen
Mai 2026
24 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.

In diesem Kurs gibt es 24 Module
This module introduces the foundational principles of cloud computing, including key service and deployment models, essential technologies, and the roles of various stakeholders. Learners will gain an understanding of how cloud infrastructure supports scalable and cost-effective IT solutions. The module also explores the building blocks that enable organizations to adapt to evolving business needs.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
2 Lektüren•Insgesamt 17 Minuten
- Introduction•13 Minuten
- Key Cloud Computing Technologies and Building Blocks•4 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Foundations of Cloud Computing•16 Minuten
This module explores foundational concepts in cloud computing, including service and deployment models, key stakeholder roles, and critical considerations for cloud adoption. Learners will also examine how emerging technologies like data science, blockchain, and quantum computing are integrated into cloud environments. By the end, you will understand the evolving landscape of cloud solutions and their impact on modern businesses.
Das ist alles enthalten
1 Video7 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
7 Lektüren•Insgesamt 44 Minuten
- Introduction•6 Minuten
- Infrastructure as a Service (IaaS)•6 Minuten
- Cloud Deployment Models•5 Minuten
- Shared Considerations for Cloud Deployments•8 Minuten
- Data Science•5 Minuten
- Blockchain•6 Minuten
- Quantum Computing•8 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Cloud Computing Fundamentals and Emerging Trends•16 Minuten
This module introduces key cloud security concepts, focusing on the identification and categorization of security controls essential for protecting cloud assets. Learners will explore different types and functionalities of security controls, gaining practical knowledge to assess and implement safeguards in cloud environments.
Das ist alles enthalten
1 Video3 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
3 Lektüren•Insgesamt 17 Minuten
- Introduction•8 Minuten
- Security Control Categories and Types•4 Minuten
- Security Control Types and Functionality•5 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Core Concepts in Cloud Security•16 Minuten
This module explores the foundational security principles for cloud computing, focusing on the unique challenges and solutions for IaaS and PaaS environments. Learners will examine different cloud service and deployment models, understand their security implications, and clarify roles and responsibilities using the shared responsibility model.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
4 Lektüren•Insgesamt 26 Minuten
- Introduction•7 Minuten
- Core Elements of Security for IaaS•6 Minuten
- Core Elements of Security for PaaS•5 Minuten
- Shared Responsibility Model for Cloud Service Models•8 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Cloud Security Fundamentals•16 Minuten
This module guides learners through the essential contractual documents involved in cloud service agreements, focusing on the perspectives and responsibilities of cloud service consumers. You will explore the structure and key elements of Cloud Service Agreements (CSA) and Service Level Agreements (SLA), gaining practical skills to assess and interpret these documents effectively.
Das ist alles enthalten
1 Video3 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
3 Lektüren•Insgesamt 20 Minuten
- Introduction•6 Minuten
- The CSA from a CSP Perspective•6 Minuten
- The Key Characteristics of an SLA•8 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Evaluating Cloud Service Providers•16 Minuten
This module explores essential strategies and technologies for securing data in cloud environments. Learners will examine data classification, storage types, security measures, and best practices for data retention and deletion. The module also covers policy implementation and employee training to mitigate risks and ensure compliance.
Das ist alles enthalten
1 Video10 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
10 Lektüren•Insgesamt 56 Minuten
- Introduction•9 Minuten
- Data Destruction•4 Minuten
- Various Storage Types and Common Threats•5 Minuten
- Security Measures for Cloud Object Storage, File Storage, and Block Storage•4 Minuten
- Data Classification and Discovery•4 Minuten
- Cloud Data Security Technologies and Common Strategies•6 Minuten
- Implementing a Cloud Security Policy•6 Minuten
- Employee Training and Awareness•4 Minuten
- Best Practices for Data Retention, Archival, and Deletion•6 Minuten
- Secure Data Deletion Techniques•8 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Cloud Data Security Fundamentals•16 Minuten
This module explores the foundational principles of data governance in cloud environments, focusing on information rights management (IRM), auditability, and accountability. Learners will gain practical insights into implementing IRM systems, ensuring compliance, and managing the cloud data life cycle effectively.
Das ist alles enthalten
1 Video7 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
7 Lektüren•Insgesamt 47 Minuten
- Introduction•7 Minuten
- The Importance of Data Governance for Cloud Security•7 Minuten
- Key Components of an Effective IRM System•5 Minuten
- Implementing IRM•6 Minuten
- Auditability in Cloud Data Governance•7 Minuten
- Key Components of Accountability•5 Minuten
- Cloud Data Life Cycle•10 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Data Governance Essentials•16 Minuten
This module explores the foundational infrastructure and platform components that underpin secure and efficient data centers, with a focus on cloud transformation. Learners will examine compute resources, virtualization technologies, and the importance of robust physical design in modern data center environments.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
4 Lektüren•Insgesamt 29 Minuten
- Introduction•7 Minuten
- Compute•6 Minuten
- Virtualization•5 Minuten
- Physical Design•11 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Secure Data Center Fundamentals•16 Minuten
This module explores the fundamentals of cloud security risk management, including how to identify, assess, and respond to risks unique to cloud environments. Learners will examine the roles and responsibilities of both cloud service providers and customers, and discover best practices for maintaining cybersecurity and compliance in the cloud. Practical strategies for risk mitigation and response are also covered.
Das ist alles enthalten
1 Video6 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
6 Lektüren•Insgesamt 42 Minuten
- Analyzing Risks•6 Minuten
- IaaS•5 Minuten
- Cybersecurity•6 Minuten
- Identifying Cloud Security Risks•8 Minuten
- Risk Response Strategies•8 Minuten
- Best Practices•9 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Risk Management in Cloud Security•16 Minuten
This module explores essential strategies for implementing security controls in cloud environments, focusing on virtualization systems, authentication methods, and audit mechanisms. Learners will gain practical knowledge on safeguarding cloud operations and effectively monitoring for security incidents through log correlation.
Das ist alles enthalten
1 Video5 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
5 Lektüren•Insgesamt 33 Minuten
- Introduction•10 Minuten
- Virtualization Systems•7 Minuten
- Authentication Methods•4 Minuten
- Key Cloud Control Audit Mechanisms•5 Minuten
- Correlation•7 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Security Controls and Access Management•16 Minuten
This module explores essential strategies for ensuring business continuity and disaster recovery (BCDR) in cloud environments. Learners will gain familiarity with key terminology, compare traditional and cloud-based BCDR options, and examine best practices for testing and maintaining BCDR plans. Real-world scenarios illustrate how organizations can prepare for and respond to unexpected disruptions.
Das ist alles enthalten
1 Video5 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
5 Lektüren•Insgesamt 35 Minuten
- Planning for the Worst-Case Scenario Business Continuity and Disaster Recovery•7 Minuten
- Key Concepts and Terminology•8 Minuten
- Cloud Environment Options for BCDR Planning•7 Minuten
- Testing and Maintenance of the BCDR Plan•5 Minuten
- A Multi-Region Deployment and BCDR Strategy for a Sample Retail Company•8 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Planning for the Worst-Case Scenario•16 Minuten
This module introduces key concepts in securing web and cloud applications, focusing on common vulnerabilities such as injection attacks and authentication failures. Learners will explore industry standards like OWASP and discover practical tools and solutions to enhance application security. By the end, participants will be equipped to recognize threats and implement effective security measures.
Das ist alles enthalten
1 Video5 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
5 Lektüren•Insgesamt 33 Minuten
- Introduction•8 Minuten
- Vulnerabilities with OWASP•6 Minuten
- Injection•6 Minuten
- Identification and Authentication Failures•6 Minuten
- Cloud Application Security Tools and Solutions•7 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Application Security Fundamentals•16 Minuten
This module explores how to integrate security practices throughout the software development life cycle, emphasizing the importance of shared responsibility among all team members. Learners will examine threat modeling techniques, secure design principles, and practical steps to avoid vulnerable code. Key methodologies such as DevOps and PASTA are also discussed to align security with business objectives.
Das ist alles enthalten
1 Video7 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
7 Lektüren•Insgesamt 43 Minuten
- Introduction•7 Minuten
- SDLC versus SSDLC•6 Minuten
- Design•4 Minuten
- DevOps•5 Minuten
- Threat Modeling•9 Minuten
- PASTA•5 Minuten
- Avoiding Vulnerable Code•7 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Secure Software Development Life Cycle Fundamentals•16 Minuten
This module explores the principles and practices of assurance, validation, and verification in cloud security, emphasizing their importance in cloud-native environments. Learners will compare functional and non-functional testing, examine software verification approaches, and understand the role of third-party reviews and API security measures. By the end, participants will be equipped to assess and enhance the security posture of cloud-based systems.
Das ist alles enthalten
1 Video5 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
5 Lektüren•Insgesamt 36 Minuten
- Assurance Validation and Verification in Security•9 Minuten
- Comparing Functional and Non-Functional Testing•5 Minuten
- Two Approaches to Software Verification•4 Minuten
- Third-Party Review Processes•6 Minuten
- Measures to Secure APIs•12 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Security Processes in Cloud-Native Environments•16 Minuten
This module explores essential strategies and tools for securing cloud applications across various platforms and deployment models. Learners will examine the roles of API gateways, key management, and application virtualization in enhancing security and operational efficiency. Practical insights into orchestration technologies like Kubernetes and Docker Swarm are also provided.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
4 Lektüren•Insgesamt 22 Minuten
- Introduction•6 Minuten
- API Gateways•6 Minuten
- Key Management•5 Minuten
- Application Virtualization and Orchestration•5 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Securing and Managing Cloud Applications•16 Minuten
This module explores the foundational concepts of Identity and Access Management (IAM), focusing on the roles of centralized directory services and identity providers (IdPs) in securing organizational resources. Learners will gain insights into how user identities are managed and authenticated across multiple platforms and services.
Das ist alles enthalten
1 Video3 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
3 Lektüren•Insgesamt 26 Minuten
- Introduction•6 Minuten
- Centralized Directory Services•6 Minuten
- IdPs•14 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Identity and Access Management Fundamentals•16 Minuten
This module explores the foundational elements of cloud infrastructure, focusing on both physical and logical components. Learners will gain practical skills in configuring network controllers, securing virtual hardware, managing OS baselines, and maintaining system availability through patching and clustering. Emphasis is placed on operational best practices and security measures essential for robust cloud environments.
Das ist alles enthalten
1 Video9 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
9 Lektüren•Insgesamt 53 Minuten
- Introduction•6 Minuten
- Network Controllers•5 Minuten
- Virtual Hardware-Specific Security Configuration Requirements•6 Minuten
- Installation of Guest OS Virtualization Toolsets•7 Minuten
- Transport Layer Security (TLS)•6 Minuten
- Firewalls•5 Minuten
- OS Baselining•5 Minuten
- Automated and Manual Patching•4 Minuten
- Availability of Clustered Hosts•9 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Cloud Infrastructure and Security Fundamentals•16 Minuten
This module explores the principles and practices of international operational controls and standards in cloud infrastructure. Learners will examine key security measures, operational procedures, and the role of automation in maintaining compliance across global environments.
Das ist alles enthalten
1 Video1 Lektüre1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
1 Lektüre•Insgesamt 21 Minuten
- Introduction•21 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Global Operational Standards and IT Service Management•16 Minuten
This module delves into the essential processes and methodologies of digital forensics, focusing on the lifecycle of evidence handling from identification to presentation. Learners will gain practical knowledge of data collection techniques and the technical readiness required to preserve digital evidence for legal and investigative purposes.
Das ist alles enthalten
1 Video3 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
3 Lektüren•Insgesamt 21 Minuten
- Introduction•5 Minuten
- Forensic Data Collection Methodologies•7 Minuten
- Collecting, Acquiring, and Preserving Digital Evidence•9 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Digital Forensics Fundamentals•16 Minuten
This module explores effective strategies for communicating with stakeholders in cloud services, including cloud providers, customers, and regulators. Learners will discover how to tailor messages, ensure transparency, and maintain compliance through proactive engagement. Emphasis is placed on building trust and credibility through clear, timely, and compliant communication practices.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
2 Lektüren•Insgesamt 12 Minuten
- Introduction•7 Minuten
- Regulators•5 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Communication Strategies in Organizational Management•16 Minuten
This module explores the essential functions of a Security Operations Center, including continuous monitoring, log management, and vulnerability assessments. Learners will gain practical insights into SIEM systems and incident management processes to strengthen organizational cybersecurity. By the end, you will understand how to identify and address security threats using industry best practices.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
4 Lektüren•Insgesamt 29 Minuten
- Introduction•7 Minuten
- Log Capture and Analysis•5 Minuten
- Security Information and Event Management (SIEM)•8 Minuten
- Vulnerability Assessments•9 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Security Operations Center Fundamentals•16 Minuten
This module explores the legal complexities and risk management strategies associated with cloud computing. Learners will examine international regulations, data governance roles, and best practices for evaluating cloud service providers. Key topics include GDPR compliance, risk assessment, vendor management, and the use of cyber risk insurance.
Das ist alles enthalten
1 Video11 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
11 Lektüren•Insgesamt 60 Minuten
- Introduction•5 Minuten
- Evaluation of Legal Risks Specific to Cloud Computing•6 Minuten
- Assessing Provider Risk Management Programs•6 Minuten
- Difference Between Data Owner/Controller and Data Custodian/Processor•5 Minuten
- GDPR•6 Minuten
- Risk Acceptance•6 Minuten
- Metrics for Risk Management•6 Minuten
- Infrastructure Risk Assessment•6 Minuten
- Vendor Assessments•4 Minuten
- Escrow•6 Minuten
- Cyber Risk Insurance•4 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Navigating Legal and Regulatory Issues in Cloud Environments•16 Minuten
This module explores the complexities of privacy in cloud environments, examining different types of private data, key global privacy regulations, and the importance of Privacy Impact Assessments. Learners will gain insights into legal frameworks such as GDPR, GLBA, and the APEC Privacy Framework, and understand how jurisdiction and contractual obligations influence data protection.
Das ist alles enthalten
1 Video7 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
7 Lektüren•Insgesamt 46 Minuten
- Introduction•5 Minuten
- Difference Between Contractual and Regulated Private Data•4 Minuten
- GDPR•5 Minuten
- Asia-Pacific•5 Minuten
- Gramm-Leach-Bliley Act (GLBA)•9 Minuten
- Australia•7 Minuten
- Privacy Impact Assessments (PIAs)•11 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Privacy and Cloud Computing Fundamentals•16 Minuten
This module explores the evolving landscape of cloud auditing, focusing on audit controls, international assurance standards, and the impact of regulatory requirements. Learners will examine methodologies such as gap analysis and the implementation of internal information security management systems (ISMS). The module also highlights the importance of organizational policies in maintaining compliance and effective audit processes.
Das ist alles enthalten
1 Video6 Lektüren1 Aufgabe
1 Video•Insgesamt 1 Minute
- Overview•1 Minute
6 Lektüren•Insgesamt 41 Minuten
- Introduction•6 Minuten
- Impact of Audit Requirements•9 Minuten
- International Standard on Assurance Engagements (ISAE)•7 Minuten
- Gap Analysis•5 Minuten
- Internal ISMS•4 Minuten
- Policies•10 Minuten
1 Aufgabe•Insgesamt 16 Minuten
- Cloud Audit Fundamentals and Compliance•16 Minuten
Dozent

von

von

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Mehr von Cloud Computing entdecken
Status: Kostenloser TestzeitraumKostenloser TestzeitraumSpezialisierung
Status: Kostenloser TestzeitraumKostenloser TestzeitraumSpezialisierung
Status: KostenlosKostenlosKurs
Status: Kostenloser TestzeitraumKostenloser Testzeitraum
Warum entscheiden sich Menschen für Coursera für ihre Karriere?

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Häufig gestellte Fragen
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Weitere Fragen
Finanzielle Unterstützung verfügbar,


