Explore all aspects of cloud security to pass the CCSP exam and boost your career with this guide packed with use cases, mock exam questions, and tips. You'll be able to apply your new-found knowledge not only to pass the exam but also at work.

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide

Instructor: Packt - Course Instructors
Included with
Recommended experience
Recommended experience
Advanced level
IT professionals and security analysts with a solid foundation in cloud technologies and cybersecurity.
Recommended experience
Recommended experience
Advanced level
IT professionals and security analysts with a solid foundation in cloud technologies and cybersecurity.
What you'll learn
Understand the scope and objectives of the CCSP exam and how to register for it.
Develop expertise in securing application lifecycle and implementing IAM design principles.
Explore data protection measures, cloud governance strategies, and compliance frameworks.
Skills you'll gain
- Cloud Computing
- Threat Management
- Cybersecurity
- Cloud Standards
- Data Management
- Data Security
- Security Management
- Disaster Recovery
- IT Security Architecture
- Security Controls
- Application Security
- Cloud Computing Architecture
- Data Governance
- Security Engineering
- Network Security
- Cloud Deployment
- Identity and Access Management
- Cloud Services
- Cryptography
- Cloud Security
Details to know

Add to your LinkedIn profile
May 2026
24 assignments
See how employees at top companies are mastering in-demand skills

There are 24 modules in this course
This module introduces the foundational principles of cloud computing, including key service and deployment models, essential technologies, and the roles of various stakeholders. Learners will gain an understanding of how cloud infrastructure supports scalable and cost-effective IT solutions. The module also explores the building blocks that enable organizations to adapt to evolving business needs.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
2 readings•Total 17 minutes
- Introduction•13 minutes
- Key Cloud Computing Technologies and Building Blocks•4 minutes
1 assignment•Total 16 minutes
- Foundations of Cloud Computing•16 minutes
This module explores foundational concepts in cloud computing, including service and deployment models, key stakeholder roles, and critical considerations for cloud adoption. Learners will also examine how emerging technologies like data science, blockchain, and quantum computing are integrated into cloud environments. By the end, you will understand the evolving landscape of cloud solutions and their impact on modern businesses.
What's included
1 video7 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
7 readings•Total 44 minutes
- Introduction•6 minutes
- Infrastructure as a Service (IaaS)•6 minutes
- Cloud Deployment Models•5 minutes
- Shared Considerations for Cloud Deployments•8 minutes
- Data Science•5 minutes
- Blockchain•6 minutes
- Quantum Computing•8 minutes
1 assignment•Total 16 minutes
- Cloud Computing Fundamentals and Emerging Trends•16 minutes
This module introduces key cloud security concepts, focusing on the identification and categorization of security controls essential for protecting cloud assets. Learners will explore different types and functionalities of security controls, gaining practical knowledge to assess and implement safeguards in cloud environments.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
3 readings•Total 17 minutes
- Introduction•8 minutes
- Security Control Categories and Types•4 minutes
- Security Control Types and Functionality•5 minutes
1 assignment•Total 16 minutes
- Core Concepts in Cloud Security•16 minutes
This module explores the foundational security principles for cloud computing, focusing on the unique challenges and solutions for IaaS and PaaS environments. Learners will examine different cloud service and deployment models, understand their security implications, and clarify roles and responsibilities using the shared responsibility model.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
4 readings•Total 26 minutes
- Introduction•7 minutes
- Core Elements of Security for IaaS•6 minutes
- Core Elements of Security for PaaS•5 minutes
- Shared Responsibility Model for Cloud Service Models•8 minutes
1 assignment•Total 16 minutes
- Cloud Security Fundamentals•16 minutes
This module guides learners through the essential contractual documents involved in cloud service agreements, focusing on the perspectives and responsibilities of cloud service consumers. You will explore the structure and key elements of Cloud Service Agreements (CSA) and Service Level Agreements (SLA), gaining practical skills to assess and interpret these documents effectively.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
3 readings•Total 20 minutes
- Introduction•6 minutes
- The CSA from a CSP Perspective•6 minutes
- The Key Characteristics of an SLA•8 minutes
1 assignment•Total 16 minutes
- Evaluating Cloud Service Providers•16 minutes
This module explores essential strategies and technologies for securing data in cloud environments. Learners will examine data classification, storage types, security measures, and best practices for data retention and deletion. The module also covers policy implementation and employee training to mitigate risks and ensure compliance.
What's included
1 video10 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
10 readings•Total 56 minutes
- Introduction•9 minutes
- Data Destruction•4 minutes
- Various Storage Types and Common Threats•5 minutes
- Security Measures for Cloud Object Storage, File Storage, and Block Storage•4 minutes
- Data Classification and Discovery•4 minutes
- Cloud Data Security Technologies and Common Strategies•6 minutes
- Implementing a Cloud Security Policy•6 minutes
- Employee Training and Awareness•4 minutes
- Best Practices for Data Retention, Archival, and Deletion•6 minutes
- Secure Data Deletion Techniques•8 minutes
1 assignment•Total 16 minutes
- Cloud Data Security Fundamentals•16 minutes
This module explores the foundational principles of data governance in cloud environments, focusing on information rights management (IRM), auditability, and accountability. Learners will gain practical insights into implementing IRM systems, ensuring compliance, and managing the cloud data life cycle effectively.
What's included
1 video7 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
7 readings•Total 47 minutes
- Introduction•7 minutes
- The Importance of Data Governance for Cloud Security•7 minutes
- Key Components of an Effective IRM System•5 minutes
- Implementing IRM•6 minutes
- Auditability in Cloud Data Governance•7 minutes
- Key Components of Accountability•5 minutes
- Cloud Data Life Cycle•10 minutes
1 assignment•Total 16 minutes
- Data Governance Essentials•16 minutes
This module explores the foundational infrastructure and platform components that underpin secure and efficient data centers, with a focus on cloud transformation. Learners will examine compute resources, virtualization technologies, and the importance of robust physical design in modern data center environments.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
4 readings•Total 29 minutes
- Introduction•7 minutes
- Compute•6 minutes
- Virtualization•5 minutes
- Physical Design•11 minutes
1 assignment•Total 16 minutes
- Secure Data Center Fundamentals•16 minutes
This module explores the fundamentals of cloud security risk management, including how to identify, assess, and respond to risks unique to cloud environments. Learners will examine the roles and responsibilities of both cloud service providers and customers, and discover best practices for maintaining cybersecurity and compliance in the cloud. Practical strategies for risk mitigation and response are also covered.
What's included
1 video6 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
6 readings•Total 42 minutes
- Analyzing Risks•6 minutes
- IaaS•5 minutes
- Cybersecurity•6 minutes
- Identifying Cloud Security Risks•8 minutes
- Risk Response Strategies•8 minutes
- Best Practices•9 minutes
1 assignment•Total 16 minutes
- Risk Management in Cloud Security•16 minutes
This module explores essential strategies for implementing security controls in cloud environments, focusing on virtualization systems, authentication methods, and audit mechanisms. Learners will gain practical knowledge on safeguarding cloud operations and effectively monitoring for security incidents through log correlation.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
5 readings•Total 33 minutes
- Introduction•10 minutes
- Virtualization Systems•7 minutes
- Authentication Methods•4 minutes
- Key Cloud Control Audit Mechanisms•5 minutes
- Correlation•7 minutes
1 assignment•Total 16 minutes
- Security Controls and Access Management•16 minutes
This module explores essential strategies for ensuring business continuity and disaster recovery (BCDR) in cloud environments. Learners will gain familiarity with key terminology, compare traditional and cloud-based BCDR options, and examine best practices for testing and maintaining BCDR plans. Real-world scenarios illustrate how organizations can prepare for and respond to unexpected disruptions.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
5 readings•Total 35 minutes
- Planning for the Worst-Case Scenario Business Continuity and Disaster Recovery•7 minutes
- Key Concepts and Terminology•8 minutes
- Cloud Environment Options for BCDR Planning•7 minutes
- Testing and Maintenance of the BCDR Plan•5 minutes
- A Multi-Region Deployment and BCDR Strategy for a Sample Retail Company•8 minutes
1 assignment•Total 16 minutes
- Planning for the Worst-Case Scenario•16 minutes
This module introduces key concepts in securing web and cloud applications, focusing on common vulnerabilities such as injection attacks and authentication failures. Learners will explore industry standards like OWASP and discover practical tools and solutions to enhance application security. By the end, participants will be equipped to recognize threats and implement effective security measures.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
5 readings•Total 33 minutes
- Introduction•8 minutes
- Vulnerabilities with OWASP•6 minutes
- Injection•6 minutes
- Identification and Authentication Failures•6 minutes
- Cloud Application Security Tools and Solutions•7 minutes
1 assignment•Total 16 minutes
- Application Security Fundamentals•16 minutes
This module explores how to integrate security practices throughout the software development life cycle, emphasizing the importance of shared responsibility among all team members. Learners will examine threat modeling techniques, secure design principles, and practical steps to avoid vulnerable code. Key methodologies such as DevOps and PASTA are also discussed to align security with business objectives.
What's included
1 video7 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
7 readings•Total 43 minutes
- Introduction•7 minutes
- SDLC versus SSDLC•6 minutes
- Design•4 minutes
- DevOps•5 minutes
- Threat Modeling•9 minutes
- PASTA•5 minutes
- Avoiding Vulnerable Code•7 minutes
1 assignment•Total 16 minutes
- Secure Software Development Life Cycle Fundamentals•16 minutes
This module explores the principles and practices of assurance, validation, and verification in cloud security, emphasizing their importance in cloud-native environments. Learners will compare functional and non-functional testing, examine software verification approaches, and understand the role of third-party reviews and API security measures. By the end, participants will be equipped to assess and enhance the security posture of cloud-based systems.
What's included
1 video5 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
5 readings•Total 36 minutes
- Assurance Validation and Verification in Security•9 minutes
- Comparing Functional and Non-Functional Testing•5 minutes
- Two Approaches to Software Verification•4 minutes
- Third-Party Review Processes•6 minutes
- Measures to Secure APIs•12 minutes
1 assignment•Total 16 minutes
- Security Processes in Cloud-Native Environments•16 minutes
This module explores essential strategies and tools for securing cloud applications across various platforms and deployment models. Learners will examine the roles of API gateways, key management, and application virtualization in enhancing security and operational efficiency. Practical insights into orchestration technologies like Kubernetes and Docker Swarm are also provided.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
4 readings•Total 22 minutes
- Introduction•6 minutes
- API Gateways•6 minutes
- Key Management•5 minutes
- Application Virtualization and Orchestration•5 minutes
1 assignment•Total 16 minutes
- Securing and Managing Cloud Applications•16 minutes
This module explores the foundational concepts of Identity and Access Management (IAM), focusing on the roles of centralized directory services and identity providers (IdPs) in securing organizational resources. Learners will gain insights into how user identities are managed and authenticated across multiple platforms and services.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
3 readings•Total 26 minutes
- Introduction•6 minutes
- Centralized Directory Services•6 minutes
- IdPs•14 minutes
1 assignment•Total 16 minutes
- Identity and Access Management Fundamentals•16 minutes
This module explores the foundational elements of cloud infrastructure, focusing on both physical and logical components. Learners will gain practical skills in configuring network controllers, securing virtual hardware, managing OS baselines, and maintaining system availability through patching and clustering. Emphasis is placed on operational best practices and security measures essential for robust cloud environments.
What's included
1 video9 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
9 readings•Total 53 minutes
- Introduction•6 minutes
- Network Controllers•5 minutes
- Virtual Hardware-Specific Security Configuration Requirements•6 minutes
- Installation of Guest OS Virtualization Toolsets•7 minutes
- Transport Layer Security (TLS)•6 minutes
- Firewalls•5 minutes
- OS Baselining•5 minutes
- Automated and Manual Patching•4 minutes
- Availability of Clustered Hosts•9 minutes
1 assignment•Total 16 minutes
- Cloud Infrastructure and Security Fundamentals•16 minutes
This module explores the principles and practices of international operational controls and standards in cloud infrastructure. Learners will examine key security measures, operational procedures, and the role of automation in maintaining compliance across global environments.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Overview•1 minute
1 reading•Total 21 minutes
- Introduction•21 minutes
1 assignment•Total 16 minutes
- Global Operational Standards and IT Service Management•16 minutes
This module delves into the essential processes and methodologies of digital forensics, focusing on the lifecycle of evidence handling from identification to presentation. Learners will gain practical knowledge of data collection techniques and the technical readiness required to preserve digital evidence for legal and investigative purposes.
What's included
1 video3 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
3 readings•Total 21 minutes
- Introduction•5 minutes
- Forensic Data Collection Methodologies•7 minutes
- Collecting, Acquiring, and Preserving Digital Evidence•9 minutes
1 assignment•Total 16 minutes
- Digital Forensics Fundamentals•16 minutes
This module explores effective strategies for communicating with stakeholders in cloud services, including cloud providers, customers, and regulators. Learners will discover how to tailor messages, ensure transparency, and maintain compliance through proactive engagement. Emphasis is placed on building trust and credibility through clear, timely, and compliant communication practices.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
2 readings•Total 12 minutes
- Introduction•7 minutes
- Regulators•5 minutes
1 assignment•Total 16 minutes
- Communication Strategies in Organizational Management•16 minutes
This module explores the essential functions of a Security Operations Center, including continuous monitoring, log management, and vulnerability assessments. Learners will gain practical insights into SIEM systems and incident management processes to strengthen organizational cybersecurity. By the end, you will understand how to identify and address security threats using industry best practices.
What's included
1 video4 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
4 readings•Total 29 minutes
- Introduction•7 minutes
- Log Capture and Analysis•5 minutes
- Security Information and Event Management (SIEM)•8 minutes
- Vulnerability Assessments•9 minutes
1 assignment•Total 16 minutes
- Security Operations Center Fundamentals•16 minutes
This module explores the legal complexities and risk management strategies associated with cloud computing. Learners will examine international regulations, data governance roles, and best practices for evaluating cloud service providers. Key topics include GDPR compliance, risk assessment, vendor management, and the use of cyber risk insurance.
What's included
1 video11 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
11 readings•Total 60 minutes
- Introduction•5 minutes
- Evaluation of Legal Risks Specific to Cloud Computing•6 minutes
- Assessing Provider Risk Management Programs•6 minutes
- Difference Between Data Owner/Controller and Data Custodian/Processor•5 minutes
- GDPR•6 minutes
- Risk Acceptance•6 minutes
- Metrics for Risk Management•6 minutes
- Infrastructure Risk Assessment•6 minutes
- Vendor Assessments•4 minutes
- Escrow•6 minutes
- Cyber Risk Insurance•4 minutes
1 assignment•Total 16 minutes
- Navigating Legal and Regulatory Issues in Cloud Environments•16 minutes
This module explores the complexities of privacy in cloud environments, examining different types of private data, key global privacy regulations, and the importance of Privacy Impact Assessments. Learners will gain insights into legal frameworks such as GDPR, GLBA, and the APEC Privacy Framework, and understand how jurisdiction and contractual obligations influence data protection.
What's included
1 video7 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
7 readings•Total 46 minutes
- Introduction•5 minutes
- Difference Between Contractual and Regulated Private Data•4 minutes
- GDPR•5 minutes
- Asia-Pacific•5 minutes
- Gramm-Leach-Bliley Act (GLBA)•9 minutes
- Australia•7 minutes
- Privacy Impact Assessments (PIAs)•11 minutes
1 assignment•Total 16 minutes
- Privacy and Cloud Computing Fundamentals•16 minutes
This module explores the evolving landscape of cloud auditing, focusing on audit controls, international assurance standards, and the impact of regulatory requirements. Learners will examine methodologies such as gap analysis and the implementation of internal information security management systems (ISMS). The module also highlights the importance of organizational policies in maintaining compliance and effective audit processes.
What's included
1 video6 readings1 assignment
1 video•Total 1 minute
- Overview•1 minute
6 readings•Total 41 minutes
- Introduction•6 minutes
- Impact of Audit Requirements•9 minutes
- International Standard on Assurance Engagements (ISAE)•7 minutes
- Gap Analysis•5 minutes
- Internal ISMS•4 minutes
- Policies•10 minutes
1 assignment•Total 16 minutes
- Cloud Audit Fundamentals and Compliance•16 minutes
Instructor

Offered by

Offered by

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,