Certified Cloud Security Professional (CCSP) Proficiency (Advanced Level)

  • 30m
  • 30 questions
The Certified Cloud Security Professional (CCSP) Proficiency benchmark measures if your experience with cloud security practices and theories is extensive. A learner who scores high on this benchmark demonstrates that they have genuine working knowledge in the major areas of cloud security and can actively participate in discussions with peers. They can also work independently and mostly without supervision.

Topics covered

  • configure Microsoft Azure Information Protection
  • define privacy issues and jurisdiction
  • define the networking and communication architecture of a cloud platform including SDN
  • define the various technologies associated with data asset security and protection
  • define training and awareness security
  • describe chain of custody for evidence collection and non-repudiation
  • describe components of a good information security management plan
  • describe data tokenization technologies
  • describe legal requirements and risks
  • describe outsourcing issues and contract design
  • describe potential threats associated with storage types including ISO/IEC 27040
  • describe software assurance and validation
  • differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility
  • enable data classification using Microsoft Azure Information Protection for sensitive data such as Protected Health Information, Personally Identifiable Information, and card holder data
  • ensure compliance by using change management
  • identify digital forensic strategies that apply to cloud computing including the scope of the analysis
  • identify the hardware used for digital forensics
  • identify the software used for digital forensics
  • list challenges associated with data discovery in the cloud
  • list IRM objectives such as data rights, provisioning, and access models
  • manage compliance with regulations and controls
  • recognize data discovery approaches and techniques for structured and unstructured data
  • recognize how PKI provides security for digital IT solutions
  • recognize how to track and maintain detailed information about IT components within an organization
  • recognize the importance of continuity management
  • recognize the physical aspect of a cloud platform
  • survey common regulations and mandates
  • use audit processes and methodologies in the cloud
  • view security listings in the Microsoft Azure Security Center
  • view SLAs for cloud services