![](/assets/education/ccsk-plus/CCSK-Plus-hero-bff296ef5197ca36f33cbb14efd19d13c36fe04792cda0ec544e2e0ba527ceb3.png)
Certificate of Cloud Security Knowledge - Plus Course
The CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on activities that reinforce classroom instruction. Students engage in a scenario of bringing a fictional organization securely into the cloud, which gives them the opportunity to apply their knowledge by performing a series of activities that would be required in a real-world environment. Students will come away ready to earn their Certificate of Cloud Security Knowledge (CCSK).
View class schedule
What are the benefits of CCSK Plus training?
- Get hands-on experience securing an organization in the cloud.
- Prepare to earn the widely recognized standard of expertise for cloud security, the Certificate of Cloud Security Knowledge (CCSK).
- Learn and practice applying the knowledge from all 14 domains of the CSA Security Guidance v4.
CCSK Plus Course - Additional Lab Content
![](/assets/education/ccsk-plus/Core_Account_Security-acc6167f2b576cf73b229bf363d1f63245c41ac34106739e70c98821cac50040.png)
Core Account Security
Learn what to configure in the first 5 minutes of opening a new cloud account and enable security controls such as MFA, basic monitoring, and IAM.
![](/assets/education/ccsk-plus/IAM_and_Monitoring_In-depth-a68bb1623345215611e7b5345614386a3a987ea5efaaef3cab678e765f757cf4.png)
IAM and Monitoring In-Depth
Expand on your work in the first lab and implement more-complex identity management and monitoring. This includes expanding IAM with Attribute Based Access Controls, implementing security alerting, and understanding how to structure enterprise-scale IAM and monitoring.
![](/assets/education/ccsk-plus/Network_and_Instance_Security-3ed1d9e953e4bf1d0c41a3492b31aedb737804ad6cfd718be900f686b5118ea0.png)
Network and Instance Security
Create a virtual network (VPC) and implement a baseline security configuration. You will also learn how to securely select and launch a virtual machine (instance), run a vulnerability assessment in the cloud, and connect to the instance.
![](/assets/education/ccsk-plus/Encryption_and_Storage_Security-9520e54d4df7bdeb38b326851fbe227e7898657282bc50b7fb9abd356e8235b7.png)
Encryption and Storage Security
Expand your deployment by adding a storage volume encrypted with a customer managed key. You will also learn how to secure snapshots and other data.
![](/assets/education/ccsk-plus/Application_Security_and_Federation-d3549abeac408220e98151ea012a04e164274e718425ec0cce2025c26f0c2fc4.png)
Application Security and Federation
Finish the technical labs by completely building out a 2-tier application and implementing federated identity using OpenID.
![](/assets/education/ccsk-plus/Risk_and_Provider_Assessment-7bf11c1a981352fd38d6e617bde1d5ee750b632a76172dc9c35cb0a6162b068f.png)
Risk and Provider Assessment
Practice using the CSA Cloud Controls Matrix and STAR registry to evaluate risk and select a cloud provider.