Certified Cloud Security Professional (CCSP): Cloud Security Operations Competency (Intermediate Level)

  • 25m
  • 25 questions
The Cloud Security Operations Competency (Intermediate Level) benchmark measures your knowledge of cloud security operations. You will be evaluated on your skills in security monitoring and analysis, security operations management, incident management and response, disaster recovery and business continuity planning, and network and infrastructure security. A learner who scores high on this benchmark demonstrates competency in many areas of operations related to cloud security discipline and has had some working exposure to CCSP cloud application security principles and practices.

Topics covered

  • compare auditing mechanisms
  • compare backup and restore policies
  • compare incident management and problem management, including performing digital forensics
  • compare release and deployment management
  • define capacity management
  • define continuity management
  • describe availability management
  • describe business continuity and continuity of operations planning
  • describe configuration management and change management practices
  • describe disaster recovery planning (DRP) and managed DRP cloud solutions
  • describe service level management , service-level agreements (SLAs), service request management, and the service desk
  • identify communication protection methods
  • identify on-premises environmental protection methods
  • identify the incident management process
  • identify what a security operations center (SOC) is
  • list details about storage protection
  • list the functions of intelligent security control monitoring solutions including Syslog, SIEM, and SOAR
  • outline a physical data center protection case study about Microsoft Azure
  • outline business impact analysis, including Recovery Time Objective (RTO), Recovery Point Objective (RPO), and recovery service levels
  • outline cloud identity management (IdM)
  • outline information security management
  • outline operating system protection
  • outline the vulnerability assessment process
  • plan various testing and exercise strategies
  • recognize how to manage communication with relevant parties