This program prepares mid-to-senior security practitioners to design, implement, and operate secure cloud architectures across public, private, hybrid, and multi-cloud environments. The curriculum aligns to the six CCSP domains and emphasizes data security, identity, platform/infra controls, secure SDLC, security operations, and legal/risk/compliance in the cloud. Demand for cloud-security talent remains strong and is expected to grow through 2050. CCSP signals capability to design, implement, and govern secure cloud environments- skills employers increasingly require.
By the end of this course, learners will be able to:
Cloud Security Architects/Engineers, Security Analysts/Consultants, DevSecOps and Application Security leads, SOC/IR professionals with cloud responsibilities, IT Risk/Compliance/Audit professionals supporting cloud portfolios.
Module 1 — Cloud Concepts, Architecture & Design
- Â Cloud characteristics, roles, and reference architectures
- Â Service & deployment models; multi-cloud and portability
- Â Shared responsibility, design patterns, secure baselines
- Â Lab: Model a secure multi-tier cloud workload with high availability
Module 2 — Cloud Data Security
- Â Data lifecycle (create/store/use/share/archive/destroy)
- Â Discovery & classification; labeling and mapping
- Â Encryption, tokenization, IRM; keys, secrets, and certificates management
- Â Lab: Build a data classification policy and design a multi-region KMS/secret management plan
Module 3 — Cloud Platform & Infrastructure Security
- Â Compute, storage, networking; management plane hardening
- Â Network segmentation, traffic inspection, zero-trust patterns
- Â Vulnerability assessment and continuous hardening
- Â BC/DR strategies (RTO/RPO), resilience testing
- Â Lab: Design micro-segmented networks and validate control placement
Module 4 — Cloud Application Security
- Â Secure SDLC and DevSecOps in cloud; CI/CD guardrails
- Â Threat modeling (STRIDE/PASTA), SCA/DAST/IAST approaches
- Â API security, supply-chain risk, OSS validation
- Â Lab: Implement a “shift-left” threat model and an assurance checklist for a cloud-native app
Module 5 — Cloud Security Operations
- Â Build/operate control stacks; logging/telemetry, SIEM in cloud
- Â IAM ops (SSO, federation, MFA), secrets rotation
- Â Incident response runbooks; acquisition & preservation considerations
- Â Lab: Create a cloud IR playbook with event collection, triage, and escalation
Module 6 — Legal, Risk & Compliance
- Â Cross-jurisdictional privacy, contractual vs. regulated data
- Â eDiscovery, forensics requirements; audit methodologies in cloud
- Â Risk analysis, supplier assessments, SLAs, and right-to-audit
- Â Workshop: Draft a cloud-specific control & evidence catalog for an audit scenario
End-to-end design review, exam strategy, timed question set with debrief
Who is the ideal candidate for this course?
Mid- to senior-level security practitioners responsible for securing cloud data, applications, and platforms, plus auditors/risk professionals evaluating cloud controls.
What are the course prerequisites?
Hands-on familiarity with security, networking, and cloud services. Exposure to IAM, encryption, and virtualization helps.
Does this course align to the official CCSP domains and weights?
Yes. Content, labs, and drills map directly to the six domains and their published weightings.
Can I take the exam before I have all the required work experience?
Yes. You can pass the exam first and hold Associate of ISC2 status while you complete the required experience.
Does holding CISSP waive CCSP experience?
Yes. An active CISSP waives the entire CCSP experience requirement (endorsement still required).
Does CCSK help with CCSP experience?
Yes. CCSK waives one year toward the CCSP domain experience requirement.
How many CPEs and what fees are required to maintain CCSP?
90 CPEs every three years. Annual Maintenance Fee is required; ISC2 members pay a single AMF each year regardless of the number of ISC2 certifications they hold.
What is the exam retake policy?
If needed: wait 30 days after the first attempt, 60 days after the second, and 90 days for the third and subsequent attempts; up to 4 attempts within any 12-month period.
Will this course include practice questions and a mock exam?
Yes—each domain includes exam-style drills, and a proctored mock exam is delivered in the capstone. (Lecture, guided labs, case studies, exam drills, capstone + mock exam)
Is the training vendor-neutral or focused on a single cloud?
Vendor-neutral with multi-cloud examples (public, private, hybrid) and patterns that transfer across providers.
Do I need programming skills?
Not required. Familiarity with APIs, automation concepts, and secure SDLC is helpful.
What roles does CCSP support?
Cloud Security Architect/Engineer, AppSec lead, DevSecOps engineer, Security Analyst, IR/SOC with cloud scope, IT Risk/Compliance/Audit with cloud portfolios.
How does CCSP differ from CCSK?
CCSK validates foundational cloud-security knowledge; CCSP is a deeper, experience-based certification covering architecture, operations, and governance at senior practitioner level.
If I already hold CISSP, is this course still useful?
Yes. CCSP dives deeper into cloud-specific architecture, data protection, application assurance, and legal/compliance nuances across cloud models.
What are job roles am I qualified for?
Cloud Security Architect; Cloud Security Engineer; Cloud Security Consultant; Cloud SecOps
Engineer / Analyst; Cloud Incident Response Lead; Threat Detection / SIEM Engineer (Cloud);
IAM Engineer / IAM Architect; DevSecOps Engineer (Cloud); Application Security Engineer
(Cloud); Cloud Risk and Compliance Analyst / Auditor
Data Security Engineer (KMS / DLP); Cloud Network Security / Zero-Trust Engineer
Solutions Architect (Security, Pre-Sales); Cloud Forensics and eDiscovery Specialist Cloud Security Program Manager
How does Global IT support students after certification?
How can I contact Global IT for questions or support?
Phone: (866)-GO-GIT-GO OR Email: info@global-itech.com
Real testimonials from our Students!
I worked 17 yrs in manufacturing as a Hilo driver, a material processor and 9 yrs as a Quality assurance technician and was let go due to the economy in February 2007. During that time I’d always had a passion for the computing arena so after weighing my options and overcoming the fear that can [...] Read more
Ralph Cook
In December 2008, I found myself parting ways with my employer of the last 22 years. I had become rather specialized in the Lotus Notes field and found that computer skill no longer in high demand and the entire IT job market rather depressed. Several months later, I became aware of Global Information Technology and [...] Read more
William Kolis
I am writing this letter today in recommendation of Global Information Technology (GIT). In the spring of 2008 I learned that my employment position was being off-shored. Of course this was devastating news. Even though I possess a bachelor’s degree in Information Systems, I realized I did not specialize in any specific IT area and [...] Read more
Lynda Wilson
Through this letter I want to thank Mr. Manish Modi and Global information Technology ( GIT) for helping me restart my career. I was working in the IT field and took a break for family reasons. After being a full time mom for 11 years, I recently decided to restart my career and wanted to [...] Read more
Sonal Shirodkar
I am delighted to write this letter of recommendation on behalf of Global Information Technology (GIT). In January 2009, I decided to follow on a Networking program at Global Information Technology (GIT). I researched and reviewed several IT training programs in the Michigan area but found out that GIT gave me so much more for [...] Read more
Alicia Binion