Certified Cloud Security Specialist (CCSS)

Introduction and Overview

The Certified Cloud Security Specialist (CCSS), a 3-day intensive training program with project work component focuses on cloud computing with respect to its security aspects. CCSS will impart in-depth knowledge with respect to security risks in the context of cloud computing, related issues and solutions. Participants will also gain knowledge about cloud security issues from an architectural design perspective. In addition, this course will cover cloud computing security taxonomies under two categories:

  1. Architectural & technological security taxonomy
  2. Process & governance-related security taxonomy

Further, this course will also impart knowledge about the key concept of Security as a Service (SECaaS) CSA’s Enterprise Architecture with a focus on its SRM (Security and Risk Management), perimeter defense security systems for cloud infrastructure and cloud security administrative best practices. The course will also present relevant industrial case studies to underscore the security issues in the cloud.


  • 24 Hours (3 Days) Classroom Training

Who Should Attend?

  • Cloud Operations Engineer
  • Cloud Infrastructure Engineer
  • Cloud Services Product Analyst
  • Cloud Software Engineer (Solution/Database)
  • Senior Cloud Operations Engineer
  • Application Support Manager – Cloud
  • Cloud Development Manager
  • Cloud Operations Manager
  • Cloud Services Product Manager
  • Infrastructure Architect – Cloud
  • Integration Architect – Cloud


Participants are expected to have any one of the following certifications to take up this GSTF CCSS certification.

  1. GSTF Certified Cloud Computing Associate (CCCA)
  2. GSTF Certified Cloud Computing Specialist (CCCS)
  3. EXIN Cloud Technologies Advanced

Assessment and Certification

  • Component 1: Written Examination (MCQ)
    • 30 Questions
    • 45 Minutes duration
    • Closed Book
    • Score 65% to pass
  • Component 2: Project Work Component (PWC)
    • Individual work
    • 2 weeks to complete from the last day of course
    • Score 65% to pass
  • Certification
    • Upon passing the course, you will be awarded “Certified Cloud Security Specialist
    • Certification body – Global Science and Technology Forum


Course Outcome

  • An in-depth understanding of Cloud Computing and its challenges
  • Different perspectives of Cloud Computing from its architectural design
  • Cloud Computing Security Taxonomies
  • Architectural and technological aspects of cloud security taxonomies
  • Process and regulatory-related aspects of cloud security taxonomies
  • Acquire knowledge on Security as a Service (SECaaS)

Course Outline

Cloud Computing, Service Models, Deployment Models & Architecture: A Quick Review

  • Introduction: Cloud Computing
  • Hype Cycle: Cloud
  • Cloud Computing Evolution
  • Definition and Characteristics
  • Benefits of Cloud Computing
  • Cloud Service Models
    • SaaS
    • PaaS
    • IaaS
  • Deployment Models
    • Private Cloud
    • Public Cloud
    • Community Cloud
    • Hybrid Cloud
  • Cloud Architecture

Problems in Cloud Computing

  • Data Integrity
  • Data Theft
  • Privacy Issues
  • Infected Application
  • Data Loss
  • Data Location
  • Security on Vendor Level
  • Security on User Level

Cloud Security – Different Perspectives

  • Cloud User Perspectives
  • Cloud Service Provider Perspectives
  • Cloud security from different service models
  • Cloud Security from different deployment models

Security Perspectives in Cloud Architecture Design

  • Data Centre or Physical Security
  • Server Security
  • Network Security
  • Application and Platform Security
  • Encryption and Key Management
  • Infrastructure Security

Cloud Computing Security Taxonomies

  • Introduction to Cloud Security Taxonomies
  • Need of Cloud Security Taxonomies
  • Types

Taxonomy 1: Architectural & Technological aspects

  • Logical Storage Segregation & Multi-tenancy Issues
  • Identity Management Issues
  • Insiders Attacks
  • Virtualization Issues
  • Cryptography and Key Management

Taxonomy 2: Process & Regulatory-related aspects

  • Governance and Regulatory Compliance Gaps
  • Insecure APIs
  • Cloud & CSP Migration Issues
  • SLA & Trust Management Gaps

Security as a Service (SECaaS)

  • Introduction to Security as a Service
  • Global forecast of Cloud Security
  • Buying criteria recommendations
  • Cloud Security Market Growth Drivers
  • Current market trends and challenges
  • Different area included in SECaaS
  • Advantages
  • Disadvantages

Top Cloud Security Vendors

  • Top Cloud Security Vendors