Certified Cloud Security Professional (CCSP) - Cloud Security & Infrastructure Professionals

Duration: 5 Days
Modes: In-Person, Live Online, On-Site
Your data is in the cloud. Is your security? This hands-on programme takes you through the real-world techniques attackers use to compromise cloud environments and teaches you how to secure, monitor, and defend cloud infrastructure across AWS, Azure, and GCP. No slides. All lab.
Course Objectives
check icon
Understand cloud computing architecture, service models (IaaS, PaaS, SaaS), and shared responsibility models
check icon
Learn to identify and exploit common misconfigurations across AWS, Azure, and GCP
check icon
Master cloud identity and access management (IAM) security
check icon
Understand cloud network security, segmentation, and traffic monitoring
check icon
Learn to secure containerised and serverless environments
check icon
Understand cloud compliance requirements including MAS TRM and CSA guidelines for cloud adoption
check icon
Master cloud incident detection, investigation, and response techniques
check icon
Learn cloud security architecture design and hardening best practices
Expected Outcomes
check icon
Assess and secure cloud environments across major cloud service providers
check icon
Identify and remediate cloud misconfigurations that lead to data breaches
check icon
Implement effective IAM policies, least privilege access, and zero trust architectures in the cloud
check icon
Monitor cloud environments for suspicious activity and unauthorised access
check icon
Secure container orchestration platforms and serverless deployments
check icon
Conduct cloud penetration testing and vulnerability assessments
check icon
Design cloud security architectures that meet regulatory compliance requirements including MAS TRM and CSA guidelines
check icon
Respond to cloud-specific security incidents with appropriate forensic techniques
Training Modules
1. Cloud Security Fundamentals
chevron down icon
1. Cloud computing models: IaaS, PaaS, SaaS
2. Shared responsibility model across AWS, Azure, and GCP
3. Cloud threat landscape and common attack vectors
4. Cloud security frameworks and compliance requirements
5. MAS TRM and CSA cloud security guidelines
2. Cloud Identity and Access Management
chevron down icon
1. IAM architecture and best practices
2. Privilege escalation in cloud environments
3. Service accounts, roles, and policy misconfigurations
4. Multi-factor authentication and conditional access
5. Hands-on IAM exploitation and hardening labs
3. Cloud Network Security
chevron down icon
1. Virtual network architecture and segmentation
2. Security groups, NACLs, and firewall rules
3. VPN and private connectivity security
4. Cloud traffic monitoring and flow log analysis
5. Detecting lateral movement in cloud environments
4. Cloud Storage and Data Security
chevron down icon
1. Storage bucket misconfigurations and data exposure
2. Encryption at rest and in transit
3. Data loss prevention in cloud environments
4. Database security in managed cloud services
5. Hands-on data exposure and remediation labs
5. Container and Serverless Security
chevron down icon
1. Docker and Kubernetes security fundamentals
2. Container image scanning and runtime security
3. Serverless function security and attack vectors
4. CI/CD pipeline security and supply chain risks
5. Hands-on container exploitation and hardening labs
6. Cloud Incident Detection and Response
chevron down icon
1. Cloud-native monitoring and logging services
2. Threat detection in cloud environments
3. Cloud forensic investigation techniques
4. Incident response in multi-cloud environments
5. Hands-on incident response simulations
7. Cloud Security Architecture and Hardening
chevron down icon
1. Zero trust architecture in cloud environments
2. Cloud security posture management (CSPM)
3. Security automation and infrastructure as code
4. Cloud security assessment and audit frameworks
5. Designing secure cloud architectures
Certification & Accreditation
Certification Path 1: GlobalACE Certification
The GlobalACE certification is designed to align with internationally recognised Knowledge, Skills, and Attitudes (KSA) standards for Information Security Professionals. Candidates are assessed through a combination of multiple choice questions, practical assessments, assignments, and case studies. Examinations are conducted at authorised centres across participating member countries, and successful candidates are eligible to apply as Associate or Professional Members under the GlobalACE framework, recognised in 64+ countries.
Certification Path 2: CyberKnights Certification
The CyberKnights certification is conducted through the KALAM platform, a purpose-built cybersecurity examination and skills validation system. Candidates take a 25-question MCQ exam within 60 minutes, with a pass mark of 70%. Exam fees are inclusive in the course fees. All certified candidates receive complimentary membership access to the KALAM Cybersecurity Collaboration and Community Skills Validation Platform, giving them access to an active community of security professionals.
Frequently Asked Questions
Which cloud platforms does the course cover?
The course covers security concepts and hands-on labs across AWS, Azure, and GCP. The principles and techniques taught are applicable across all major cloud service providers.
Do I need existing cloud experience to attend?
Basic familiarity with at least one cloud platform is recommended. You should understand core cloud concepts like virtual machines, storage buckets, and networking. Deep expertise is not required.
Is this course relevant if we use a multi-cloud strategy?
Absolutely. The programme is designed with multi-cloud environments in mind, covering security principles and attack techniques that apply across providers, as well as platform-specific misconfigurations.
How does this help with MAS TRM cloud compliance?
The programme covers MAS TRM requirements for cloud adoption, data residency, access controls, and incident response, helping your team build and maintain compliant cloud environments.
Can this training be customised for our specific cloud environment?
Yes. We offer private on-site delivery where labs and scenarios can be tailored to your organisation's cloud architecture, provider mix, and compliance requirements.
Does the course cover DevSecOps and CI/CD security?
Yes. Module 5 covers CI/CD pipeline security, container security, and infrastructure-as-code security practices, aligning with modern DevSecOps workflows.
Ready to get started?
Train your team. Strengthen your defence.
Fill in the form and our training advisors will get back to you within 24 hours with a tailored programme recommendation for your team.
20,000+ professionals trained across enterprise and government sectors
chevron down icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.