Cloud Computing Security Knowledge - CCSK Plus

3 Day Course
Hands On
Official Curriculum
Code TPH8P76S

This course has been retired. Please view currently available HP Training Courses.


Hide all

Introduction And Cloud Architectures (7 topics)

  • Define cloud computing and its business benefits.
  • List the attributes that define cloud computing.
  • Identify pros and cons of cloud computing choices.
  • Discuss the different components of the cloud computing stack.
  • Differentiate service models and deployment models.
  • Describe individual service models and how they operate.
  • Describe individual deployment models and how they operate

Adapting Governance And Information Risk Mgt (10 topics)

  • List the key elements of information security governance related to cloud operations
  • Identify strategies to manage provider governance
  • Describe the steps in risk management lifecycle specifically for moving to the cloud
  • List alternatives for risk treatment used by CSA
  • Discuss levels of maturity in risk management
  • Differentiate risk treatment implementation responsibility across service models
  • Identify types of assets and how to evaluate their value to the rganization
  • Describe how incidents change in cloud
  • Identify challenges in incident response when working with a cloud provider at various service levels
  • List the steps in responding to a security incident

Compliance And Audit In The Cloud (6 topics)

  • Identify types legal responsibilities based on business compliance, regulations, and geography
  • Discuss responsibility and accountability for assessing and mitigating information security risks
  • Discuss contractual elements that support compliance and verification
  • Describe types of audit and how to plan for them
  • List required artifacts for auditing
  • Describe how to handle the results of an audit

Physical And Administrative Controls (2 topics)

  • Recognize sample security controls for data center perimeter
  • Describe how cloud provider employment policies affect information security

Infrastructure Technology (7 topics)

  • Identify architectural layers in a cloud environment.
  • Provide a high level description of the operation of hypervisors in creating, updating, and destroying virtual machines
  • Discuss operation of the cloud management plane.
  • List elements of virtual networking.
  • Give a general description of the operation of shared storage.
  • List additional infrastructure elements required in the operation of a cloud architecture.
  • Differentiate the infrastructure delivery for different service models.

Securing Cloud Infrastructure (9 topics)

  • Discuss the security advantages and disadvantages of working with virtual infrastructure
  • Identify security concerns in a cloud environment
  • List elements to secure the host and hypervisor levels
  • Discuss how to secure the cloud management plane
  • Describe how to secure virtual networking
  • Describe how to secure virtual machines during creation, use, movement, and destruction
  • List ways to secure API interfaces
  • Learn the security basics for the difference service models
  • Assess the security implications of different deployment models

Data Security For Cloud Computing (6 topics)

  • Describe different cloud storage models
  • Define security issues for data in the cloud
  • Describe data security lifecycle
  • Use functions, actors, and locations to identify cloud security issues, and specific controls to address security and governance
  • Discuss data encryption and key management
  • Describe forms of data loss prevention

Cloud Identity And Access Management (8 topics)

  • Define identity, entitlement, and access management terms
  • Differentiate between identity and access management
  • List best practices in provisioning identity and entitlement
  • Describe how to build an entitlement matrix
  • Differentiate between authentication, authorization, and access control
  • Describe architectural models for provisioning and how to integrate them
  • Describe the operation of federated identity management
  • List key identity management standards and how they facilitate interoperation

Developing And Securing Cloud Applications (9 topics)

  • Describe the importance of standard interfaces and the potential costs of vendor lock-in
  • Differentiate between portability and interoperability
  • Describe how to minimize disruption of service during vendor change
  • Define Application Architecture, Design, and Operations lifecycle
  • Discuss impact of cloud operations on SDLC and identify threat modeling requirements
  • Differentiate static and dynamic testing methods and give examples of each
  • Examine application security tools and vulnerability management processes
  • Discuss the role of compliance in cloud applications
  • Describe methods of ongoing application monitoring

Security As A Service (3 topics)

  • Define SECaaS
  • List advantages and concerns for SECaaS
  • Describe various forms of security offered as services

Vendor Relationships (4 topics)

  • List elements of risk management planning and implementation to look for in a cloud service provider
  • Identify strategies to manage provider governance
  • Advocate for contractual clarity in all phases of risk management and information security
  • Describe elements of supplier assessment for cloud providers

Cloud Risk Assessment Exercise - Public Cloud (6 topics)

  • Perform minimal risk assessment for moving data and/or processing
  • to the cloud
  • Evaluate asset types
  • Estimate impact of breach
  • Map to service and deployment models
  • Sketch data flows

Create And Secure A Public Cloud Instance Lab (11 topics)

  • Reinforce your understanding of public IaaS architectures
  • Define core IaaS components/options
  • Images
  • Instances
  • Volumes
  • Regions, Security Groups, and Availability Zones
  • Object storage and snapshots
  • Launch and connect to your first instance
  • Manage Images and host keys
  • Secure your instance
  • Verify instance availability

Encrypting A Storage Volume Lab (8 topics)

  • Describe why encryption is important
  • Select an encryption method
  • Create and attach a storage volume
  • Encrypt and format the volume
  • Configure key management options
  • Predict the effects of rebooting
  • Attach the encrypted volume to another instance (Advanced Exercise)
  • Install MySQL on the encrypted volume

Create And Secure a Cloud Application Lab (3 topics)

  • Understand basic cloud application architectures
  • Manage multiple Security Groups for enhanced network security
  • Assess the security risks of snapshots

Identity And Access Management Lab (4 topics)

  • Secure your HP Helion 'management plane' with IAM
  • Describe federated identity architectures
  • Implement federated identity for your application using OpenID
  • Describe how to apply the same principles in an enterprise production environment


We recommend attendees have at least a basic understanding of security fundamentals, such as firewalls, secure development, encryption, and identity management. For security foundations training, refer to the HP Information Security Common Body of Knowledge curriculum found at

Course PDF