Packt

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

Coursera PlusMonthly 3 个月 课程4 折优惠 ,让你轻松掌握闪耀技能。立即节省

Packt

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
高级设置 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
高级设置 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Understand the scope and objectives of the CCSP exam and how to register for it.

  • Develop expertise in securing application lifecycle and implementing IAM design principles.

  • Explore data protection measures, cloud governance strategies, and compliance frameworks.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

May 2026

作业

24 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有24个模块

This module introduces the foundational principles of cloud computing, including key service and deployment models, essential technologies, and the roles of various stakeholders. Learners will gain an understanding of how cloud infrastructure supports scalable and cost-effective IT solutions. The module also explores the building blocks that enable organizations to adapt to evolving business needs.

涵盖的内容

1个视频2篇阅读材料1个作业

This module explores foundational concepts in cloud computing, including service and deployment models, key stakeholder roles, and critical considerations for cloud adoption. Learners will also examine how emerging technologies like data science, blockchain, and quantum computing are integrated into cloud environments. By the end, you will understand the evolving landscape of cloud solutions and their impact on modern businesses.

涵盖的内容

1个视频7篇阅读材料1个作业

This module introduces key cloud security concepts, focusing on the identification and categorization of security controls essential for protecting cloud assets. Learners will explore different types and functionalities of security controls, gaining practical knowledge to assess and implement safeguards in cloud environments.

涵盖的内容

1个视频3篇阅读材料1个作业

This module explores the foundational security principles for cloud computing, focusing on the unique challenges and solutions for IaaS and PaaS environments. Learners will examine different cloud service and deployment models, understand their security implications, and clarify roles and responsibilities using the shared responsibility model.

涵盖的内容

1个视频4篇阅读材料1个作业

This module guides learners through the essential contractual documents involved in cloud service agreements, focusing on the perspectives and responsibilities of cloud service consumers. You will explore the structure and key elements of Cloud Service Agreements (CSA) and Service Level Agreements (SLA), gaining practical skills to assess and interpret these documents effectively.

涵盖的内容

1个视频3篇阅读材料1个作业

This module explores essential strategies and technologies for securing data in cloud environments. Learners will examine data classification, storage types, security measures, and best practices for data retention and deletion. The module also covers policy implementation and employee training to mitigate risks and ensure compliance.

涵盖的内容

1个视频10篇阅读材料1个作业

This module explores the foundational principles of data governance in cloud environments, focusing on information rights management (IRM), auditability, and accountability. Learners will gain practical insights into implementing IRM systems, ensuring compliance, and managing the cloud data life cycle effectively.

涵盖的内容

1个视频7篇阅读材料1个作业

This module explores the foundational infrastructure and platform components that underpin secure and efficient data centers, with a focus on cloud transformation. Learners will examine compute resources, virtualization technologies, and the importance of robust physical design in modern data center environments.

涵盖的内容

1个视频4篇阅读材料1个作业

This module explores the fundamentals of cloud security risk management, including how to identify, assess, and respond to risks unique to cloud environments. Learners will examine the roles and responsibilities of both cloud service providers and customers, and discover best practices for maintaining cybersecurity and compliance in the cloud. Practical strategies for risk mitigation and response are also covered.

涵盖的内容

1个视频6篇阅读材料1个作业

This module explores essential strategies for implementing security controls in cloud environments, focusing on virtualization systems, authentication methods, and audit mechanisms. Learners will gain practical knowledge on safeguarding cloud operations and effectively monitoring for security incidents through log correlation.

涵盖的内容

1个视频5篇阅读材料1个作业

This module explores essential strategies for ensuring business continuity and disaster recovery (BCDR) in cloud environments. Learners will gain familiarity with key terminology, compare traditional and cloud-based BCDR options, and examine best practices for testing and maintaining BCDR plans. Real-world scenarios illustrate how organizations can prepare for and respond to unexpected disruptions.

涵盖的内容

1个视频5篇阅读材料1个作业

This module introduces key concepts in securing web and cloud applications, focusing on common vulnerabilities such as injection attacks and authentication failures. Learners will explore industry standards like OWASP and discover practical tools and solutions to enhance application security. By the end, participants will be equipped to recognize threats and implement effective security measures.

涵盖的内容

1个视频5篇阅读材料1个作业

This module explores how to integrate security practices throughout the software development life cycle, emphasizing the importance of shared responsibility among all team members. Learners will examine threat modeling techniques, secure design principles, and practical steps to avoid vulnerable code. Key methodologies such as DevOps and PASTA are also discussed to align security with business objectives.

涵盖的内容

1个视频7篇阅读材料1个作业

This module explores the principles and practices of assurance, validation, and verification in cloud security, emphasizing their importance in cloud-native environments. Learners will compare functional and non-functional testing, examine software verification approaches, and understand the role of third-party reviews and API security measures. By the end, participants will be equipped to assess and enhance the security posture of cloud-based systems.

涵盖的内容

1个视频5篇阅读材料1个作业

This module explores essential strategies and tools for securing cloud applications across various platforms and deployment models. Learners will examine the roles of API gateways, key management, and application virtualization in enhancing security and operational efficiency. Practical insights into orchestration technologies like Kubernetes and Docker Swarm are also provided.

涵盖的内容

1个视频4篇阅读材料1个作业

This module explores the foundational concepts of Identity and Access Management (IAM), focusing on the roles of centralized directory services and identity providers (IdPs) in securing organizational resources. Learners will gain insights into how user identities are managed and authenticated across multiple platforms and services.

涵盖的内容

1个视频3篇阅读材料1个作业

This module explores the foundational elements of cloud infrastructure, focusing on both physical and logical components. Learners will gain practical skills in configuring network controllers, securing virtual hardware, managing OS baselines, and maintaining system availability through patching and clustering. Emphasis is placed on operational best practices and security measures essential for robust cloud environments.

涵盖的内容

1个视频9篇阅读材料1个作业

This module explores the principles and practices of international operational controls and standards in cloud infrastructure. Learners will examine key security measures, operational procedures, and the role of automation in maintaining compliance across global environments.

涵盖的内容

1个视频1篇阅读材料1个作业

This module delves into the essential processes and methodologies of digital forensics, focusing on the lifecycle of evidence handling from identification to presentation. Learners will gain practical knowledge of data collection techniques and the technical readiness required to preserve digital evidence for legal and investigative purposes.

涵盖的内容

1个视频3篇阅读材料1个作业

This module explores effective strategies for communicating with stakeholders in cloud services, including cloud providers, customers, and regulators. Learners will discover how to tailor messages, ensure transparency, and maintain compliance through proactive engagement. Emphasis is placed on building trust and credibility through clear, timely, and compliant communication practices.

涵盖的内容

1个视频2篇阅读材料1个作业

This module explores the essential functions of a Security Operations Center, including continuous monitoring, log management, and vulnerability assessments. Learners will gain practical insights into SIEM systems and incident management processes to strengthen organizational cybersecurity. By the end, you will understand how to identify and address security threats using industry best practices.

涵盖的内容

1个视频4篇阅读材料1个作业

This module explores the legal complexities and risk management strategies associated with cloud computing. Learners will examine international regulations, data governance roles, and best practices for evaluating cloud service providers. Key topics include GDPR compliance, risk assessment, vendor management, and the use of cyber risk insurance.

涵盖的内容

1个视频11篇阅读材料1个作业

This module explores the complexities of privacy in cloud environments, examining different types of private data, key global privacy regulations, and the importance of Privacy Impact Assessments. Learners will gain insights into legal frameworks such as GDPR, GLBA, and the APEC Privacy Framework, and understand how jurisdiction and contractual obligations influence data protection.

涵盖的内容

1个视频7篇阅读材料1个作业

This module explores the evolving landscape of cloud auditing, focusing on audit controls, international assurance standards, and the impact of regulatory requirements. Learners will examine methodologies such as gap analysis and the implementation of internal information security management systems (ISMS). The module also highlights the importance of organizational policies in maintaining compliance and effective audit processes.

涵盖的内容

1个视频6篇阅读材料1个作业

位教师

Packt - Course Instructors
Packt
1,778 门课程508,272 名学生

提供方

Packt

从 Cloud Computing 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题