CCSK v5 Curriculum
CCSK v5 Curriculum
Domain 1:
Cloud Computing Concepts & Architectures
Describes and defines cloud computing, sets baseline terminology, and details the overall controls,
deployment, and architectural models.
Domain 3:
Risk, Audit, & Compliance
Focuses on cloud security, risk, audit, and compliance, including evaluating cloud service providers and
establishing cloud risk registries.
Domain 5:
Identity & Access Management
Focuses primarily on IAM between an organization and cloud providers or between cloud providers
and services.
Domain 7:
Infrastructure & Networking
Focuses on managing the overall infrastructure footprint and network security, including the CSP's
infrastructure security responsibilities.
Domain 9:
Data Security
Addresses the complexities of data security in the cloud, covering essential strategies, tools, and
practices for protecting data in transit and at rest.
Domain 10:
Application Security
Focuses on the unique challenges and opportunities presented by application security in the cloud
environment from the initial design phase to ongoing maintenance.
Domain 11:
Incident Response & Resilience
Focuses on identifying and explaining best practices for cloud incident response and resilience that
security professionals may reference when developing their own incident plans and processes.
Domain 12:
Related Technologies & Strategies
Introduces the foundational concepts and focuses on developing a strategic cybersecurity approach to
Zero Trust and Artificial Intelligence.
The CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on
activities that reinforce classroom instruction. Students engage in a scenario of bringing a fictional
organization securely into the cloud, which gives them the opportunity to apply their knowledge by
performing a series of activities that would be required in a real-world environment. Labs are available in
either Azure or AWS.
Lab 1:
Core Account Security
Learn what to configure in the first 5 minutes of opening a new cloud account and enable security
controls such as MFA, basic monitoring, and IAM.
Lab 2:
IAM & Monitoring In-Depth
Expand on your work in the first lab and implement more-complex identity management and monitoring.
This includes expanding IAM with Attribute Based Access Controls, implementing security alerting, and
understanding how to structure enterprise-scale IAM and monitoring.
Lab 4:
Encryption & Storage Security
Expand your deployment by adding a storage volume encrypted with a customer managed key. You will
also learn how to secure snapshots and other data.
Lab 5:
Application Security & Federation
Finish the technical labs by completely building out a 2-tier application based on WordPress and
implementing CSPM scanning of the environment.