Explore all aspects of cloud security to pass the CCSP exam and boost your career with this guide packed with use cases, mock exam questions, and tips. You'll be able to apply your new-found knowledge not only to pass the exam but also at work.
Coursera PlusMonthly 3 个月 课程4 折优惠 ,让你轻松掌握闪耀技能。立即节省

推荐体验
推荐体验
高级
IT professionals and security analysts with a solid foundation in cloud technologies and cybersecurity.
推荐体验
推荐体验
高级
IT professionals and security analysts with a solid foundation in cloud technologies and cybersecurity.
您将学到什么
Understand the scope and objectives of the CCSP exam and how to register for it.
Develop expertise in securing application lifecycle and implementing IAM design principles.
Explore data protection measures, cloud governance strategies, and compliance frameworks.
您将获得的技能
- Cloud Computing
- Identity and Access Management
- Security Controls
- IT Security Architecture
- Cybersecurity
- Security Engineering
- Threat Management
- Cryptography
- Data Security
- Network Security
- Cloud Services
- Data Governance
- Data Management
- Security Management
- Cloud Standards
- Cloud Computing Architecture
- Cloud Deployment
- Cloud Security
- Disaster Recovery
- Application Security
要了解的详细信息

添加到您的领英档案
May 2026
24 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有24个模块
This module introduces the foundational principles of cloud computing, including key service and deployment models, essential technologies, and the roles of various stakeholders. Learners will gain an understanding of how cloud infrastructure supports scalable and cost-effective IT solutions. The module also explores the building blocks that enable organizations to adapt to evolving business needs.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
2篇阅读材料•总计17分钟
- Introduction•13分钟
- Key Cloud Computing Technologies and Building Blocks•4分钟
1个作业•总计16分钟
- Foundations of Cloud Computing•16分钟
This module explores foundational concepts in cloud computing, including service and deployment models, key stakeholder roles, and critical considerations for cloud adoption. Learners will also examine how emerging technologies like data science, blockchain, and quantum computing are integrated into cloud environments. By the end, you will understand the evolving landscape of cloud solutions and their impact on modern businesses.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
7篇阅读材料•总计44分钟
- Introduction•6分钟
- Infrastructure as a Service (IaaS)•6分钟
- Cloud Deployment Models•5分钟
- Shared Considerations for Cloud Deployments•8分钟
- Data Science•5分钟
- Blockchain•6分钟
- Quantum Computing•8分钟
1个作业•总计16分钟
- Cloud Computing Fundamentals and Emerging Trends•16分钟
This module introduces key cloud security concepts, focusing on the identification and categorization of security controls essential for protecting cloud assets. Learners will explore different types and functionalities of security controls, gaining practical knowledge to assess and implement safeguards in cloud environments.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
3篇阅读材料•总计17分钟
- Introduction•8分钟
- Security Control Categories and Types•4分钟
- Security Control Types and Functionality•5分钟
1个作业•总计16分钟
- Core Concepts in Cloud Security•16分钟
This module explores the foundational security principles for cloud computing, focusing on the unique challenges and solutions for IaaS and PaaS environments. Learners will examine different cloud service and deployment models, understand their security implications, and clarify roles and responsibilities using the shared responsibility model.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
4篇阅读材料•总计26分钟
- Introduction•7分钟
- Core Elements of Security for IaaS•6分钟
- Core Elements of Security for PaaS•5分钟
- Shared Responsibility Model for Cloud Service Models•8分钟
1个作业•总计16分钟
- Cloud Security Fundamentals•16分钟
This module guides learners through the essential contractual documents involved in cloud service agreements, focusing on the perspectives and responsibilities of cloud service consumers. You will explore the structure and key elements of Cloud Service Agreements (CSA) and Service Level Agreements (SLA), gaining practical skills to assess and interpret these documents effectively.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
3篇阅读材料•总计20分钟
- Introduction•6分钟
- The CSA from a CSP Perspective•6分钟
- The Key Characteristics of an SLA•8分钟
1个作业•总计16分钟
- Evaluating Cloud Service Providers•16分钟
This module explores essential strategies and technologies for securing data in cloud environments. Learners will examine data classification, storage types, security measures, and best practices for data retention and deletion. The module also covers policy implementation and employee training to mitigate risks and ensure compliance.
涵盖的内容
1个视频10篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
10篇阅读材料•总计56分钟
- Introduction•9分钟
- Data Destruction•4分钟
- Various Storage Types and Common Threats•5分钟
- Security Measures for Cloud Object Storage, File Storage, and Block Storage•4分钟
- Data Classification and Discovery•4分钟
- Cloud Data Security Technologies and Common Strategies•6分钟
- Implementing a Cloud Security Policy•6分钟
- Employee Training and Awareness•4分钟
- Best Practices for Data Retention, Archival, and Deletion•6分钟
- Secure Data Deletion Techniques•8分钟
1个作业•总计16分钟
- Cloud Data Security Fundamentals•16分钟
This module explores the foundational principles of data governance in cloud environments, focusing on information rights management (IRM), auditability, and accountability. Learners will gain practical insights into implementing IRM systems, ensuring compliance, and managing the cloud data life cycle effectively.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
7篇阅读材料•总计47分钟
- Introduction•7分钟
- The Importance of Data Governance for Cloud Security•7分钟
- Key Components of an Effective IRM System•5分钟
- Implementing IRM•6分钟
- Auditability in Cloud Data Governance•7分钟
- Key Components of Accountability•5分钟
- Cloud Data Life Cycle•10分钟
1个作业•总计16分钟
- Data Governance Essentials•16分钟
This module explores the foundational infrastructure and platform components that underpin secure and efficient data centers, with a focus on cloud transformation. Learners will examine compute resources, virtualization technologies, and the importance of robust physical design in modern data center environments.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
4篇阅读材料•总计29分钟
- Introduction•7分钟
- Compute•6分钟
- Virtualization•5分钟
- Physical Design•11分钟
1个作业•总计16分钟
- Secure Data Center Fundamentals•16分钟
This module explores the fundamentals of cloud security risk management, including how to identify, assess, and respond to risks unique to cloud environments. Learners will examine the roles and responsibilities of both cloud service providers and customers, and discover best practices for maintaining cybersecurity and compliance in the cloud. Practical strategies for risk mitigation and response are also covered.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
6篇阅读材料•总计42分钟
- Analyzing Risks•6分钟
- IaaS•5分钟
- Cybersecurity•6分钟
- Identifying Cloud Security Risks•8分钟
- Risk Response Strategies•8分钟
- Best Practices•9分钟
1个作业•总计16分钟
- Risk Management in Cloud Security•16分钟
This module explores essential strategies for implementing security controls in cloud environments, focusing on virtualization systems, authentication methods, and audit mechanisms. Learners will gain practical knowledge on safeguarding cloud operations and effectively monitoring for security incidents through log correlation.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
5篇阅读材料•总计33分钟
- Introduction•10分钟
- Virtualization Systems•7分钟
- Authentication Methods•4分钟
- Key Cloud Control Audit Mechanisms•5分钟
- Correlation•7分钟
1个作业•总计16分钟
- Security Controls and Access Management•16分钟
This module explores essential strategies for ensuring business continuity and disaster recovery (BCDR) in cloud environments. Learners will gain familiarity with key terminology, compare traditional and cloud-based BCDR options, and examine best practices for testing and maintaining BCDR plans. Real-world scenarios illustrate how organizations can prepare for and respond to unexpected disruptions.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
5篇阅读材料•总计35分钟
- Planning for the Worst-Case Scenario Business Continuity and Disaster Recovery•7分钟
- Key Concepts and Terminology•8分钟
- Cloud Environment Options for BCDR Planning•7分钟
- Testing and Maintenance of the BCDR Plan•5分钟
- A Multi-Region Deployment and BCDR Strategy for a Sample Retail Company•8分钟
1个作业•总计16分钟
- Planning for the Worst-Case Scenario•16分钟
This module introduces key concepts in securing web and cloud applications, focusing on common vulnerabilities such as injection attacks and authentication failures. Learners will explore industry standards like OWASP and discover practical tools and solutions to enhance application security. By the end, participants will be equipped to recognize threats and implement effective security measures.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
5篇阅读材料•总计33分钟
- Introduction•8分钟
- Vulnerabilities with OWASP•6分钟
- Injection•6分钟
- Identification and Authentication Failures•6分钟
- Cloud Application Security Tools and Solutions•7分钟
1个作业•总计16分钟
- Application Security Fundamentals•16分钟
This module explores how to integrate security practices throughout the software development life cycle, emphasizing the importance of shared responsibility among all team members. Learners will examine threat modeling techniques, secure design principles, and practical steps to avoid vulnerable code. Key methodologies such as DevOps and PASTA are also discussed to align security with business objectives.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
7篇阅读材料•总计43分钟
- Introduction•7分钟
- SDLC versus SSDLC•6分钟
- Design•4分钟
- DevOps•5分钟
- Threat Modeling•9分钟
- PASTA•5分钟
- Avoiding Vulnerable Code•7分钟
1个作业•总计16分钟
- Secure Software Development Life Cycle Fundamentals•16分钟
This module explores the principles and practices of assurance, validation, and verification in cloud security, emphasizing their importance in cloud-native environments. Learners will compare functional and non-functional testing, examine software verification approaches, and understand the role of third-party reviews and API security measures. By the end, participants will be equipped to assess and enhance the security posture of cloud-based systems.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
5篇阅读材料•总计36分钟
- Assurance Validation and Verification in Security•9分钟
- Comparing Functional and Non-Functional Testing•5分钟
- Two Approaches to Software Verification•4分钟
- Third-Party Review Processes•6分钟
- Measures to Secure APIs•12分钟
1个作业•总计16分钟
- Security Processes in Cloud-Native Environments•16分钟
This module explores essential strategies and tools for securing cloud applications across various platforms and deployment models. Learners will examine the roles of API gateways, key management, and application virtualization in enhancing security and operational efficiency. Practical insights into orchestration technologies like Kubernetes and Docker Swarm are also provided.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
4篇阅读材料•总计22分钟
- Introduction•6分钟
- API Gateways•6分钟
- Key Management•5分钟
- Application Virtualization and Orchestration•5分钟
1个作业•总计16分钟
- Securing and Managing Cloud Applications•16分钟
This module explores the foundational concepts of Identity and Access Management (IAM), focusing on the roles of centralized directory services and identity providers (IdPs) in securing organizational resources. Learners will gain insights into how user identities are managed and authenticated across multiple platforms and services.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
3篇阅读材料•总计26分钟
- Introduction•6分钟
- Centralized Directory Services•6分钟
- IdPs•14分钟
1个作业•总计16分钟
- Identity and Access Management Fundamentals•16分钟
This module explores the foundational elements of cloud infrastructure, focusing on both physical and logical components. Learners will gain practical skills in configuring network controllers, securing virtual hardware, managing OS baselines, and maintaining system availability through patching and clustering. Emphasis is placed on operational best practices and security measures essential for robust cloud environments.
涵盖的内容
1个视频9篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
9篇阅读材料•总计53分钟
- Introduction•6分钟
- Network Controllers•5分钟
- Virtual Hardware-Specific Security Configuration Requirements•6分钟
- Installation of Guest OS Virtualization Toolsets•7分钟
- Transport Layer Security (TLS)•6分钟
- Firewalls•5分钟
- OS Baselining•5分钟
- Automated and Manual Patching•4分钟
- Availability of Clustered Hosts•9分钟
1个作业•总计16分钟
- Cloud Infrastructure and Security Fundamentals•16分钟
This module explores the principles and practices of international operational controls and standards in cloud infrastructure. Learners will examine key security measures, operational procedures, and the role of automation in maintaining compliance across global environments.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
1篇阅读材料•总计21分钟
- Introduction•21分钟
1个作业•总计16分钟
- Global Operational Standards and IT Service Management•16分钟
This module delves into the essential processes and methodologies of digital forensics, focusing on the lifecycle of evidence handling from identification to presentation. Learners will gain practical knowledge of data collection techniques and the technical readiness required to preserve digital evidence for legal and investigative purposes.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
3篇阅读材料•总计21分钟
- Introduction•5分钟
- Forensic Data Collection Methodologies•7分钟
- Collecting, Acquiring, and Preserving Digital Evidence•9分钟
1个作业•总计16分钟
- Digital Forensics Fundamentals•16分钟
This module explores effective strategies for communicating with stakeholders in cloud services, including cloud providers, customers, and regulators. Learners will discover how to tailor messages, ensure transparency, and maintain compliance through proactive engagement. Emphasis is placed on building trust and credibility through clear, timely, and compliant communication practices.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
2篇阅读材料•总计12分钟
- Introduction•7分钟
- Regulators•5分钟
1个作业•总计16分钟
- Communication Strategies in Organizational Management•16分钟
This module explores the essential functions of a Security Operations Center, including continuous monitoring, log management, and vulnerability assessments. Learners will gain practical insights into SIEM systems and incident management processes to strengthen organizational cybersecurity. By the end, you will understand how to identify and address security threats using industry best practices.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
4篇阅读材料•总计29分钟
- Introduction•7分钟
- Log Capture and Analysis•5分钟
- Security Information and Event Management (SIEM)•8分钟
- Vulnerability Assessments•9分钟
1个作业•总计16分钟
- Security Operations Center Fundamentals•16分钟
This module explores the legal complexities and risk management strategies associated with cloud computing. Learners will examine international regulations, data governance roles, and best practices for evaluating cloud service providers. Key topics include GDPR compliance, risk assessment, vendor management, and the use of cyber risk insurance.
涵盖的内容
1个视频11篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
11篇阅读材料•总计60分钟
- Introduction•5分钟
- Evaluation of Legal Risks Specific to Cloud Computing•6分钟
- Assessing Provider Risk Management Programs•6分钟
- Difference Between Data Owner/Controller and Data Custodian/Processor•5分钟
- GDPR•6分钟
- Risk Acceptance•6分钟
- Metrics for Risk Management•6分钟
- Infrastructure Risk Assessment•6分钟
- Vendor Assessments•4分钟
- Escrow•6分钟
- Cyber Risk Insurance•4分钟
1个作业•总计16分钟
- Navigating Legal and Regulatory Issues in Cloud Environments•16分钟
This module explores the complexities of privacy in cloud environments, examining different types of private data, key global privacy regulations, and the importance of Privacy Impact Assessments. Learners will gain insights into legal frameworks such as GDPR, GLBA, and the APEC Privacy Framework, and understand how jurisdiction and contractual obligations influence data protection.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
7篇阅读材料•总计46分钟
- Introduction•5分钟
- Difference Between Contractual and Regulated Private Data•4分钟
- GDPR•5分钟
- Asia-Pacific•5分钟
- Gramm-Leach-Bliley Act (GLBA)•9分钟
- Australia•7分钟
- Privacy Impact Assessments (PIAs)•11分钟
1个作业•总计16分钟
- Privacy and Cloud Computing Fundamentals•16分钟
This module explores the evolving landscape of cloud auditing, focusing on audit controls, international assurance standards, and the impact of regulatory requirements. Learners will examine methodologies such as gap analysis and the implementation of internal information security management systems (ISMS). The module also highlights the importance of organizational policies in maintaining compliance and effective audit processes.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频•总计1分钟
- Overview•1分钟
6篇阅读材料•总计41分钟
- Introduction•6分钟
- Impact of Audit Requirements•9分钟
- International Standard on Assurance Engagements (ISAE)•7分钟
- Gap Analysis•5分钟
- Internal ISMS•4分钟
- Policies•10分钟
1个作业•总计16分钟
- Cloud Audit Fundamentals and Compliance•16分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
从 Cloud Computing 浏览更多内容
状态:免费试用免费试用专项课程
状态:免费试用免费试用专项课程
状态:免费免费
状态:免费试用免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

