CSA PayForward Training on Cloud Security Program
Scheme to Nurture Cloud Security Literate Personnel
Overview
There has always been a worldwide shortage and demand for cybersecurity personnel. The pandemic lockdown saw an increase in cloud usage and greater cloud adoption. Many enterprises pivoted to the cloud to take advantage of its elasticity, scalability and agility to enhance their time to market. The shortage of cloud professionals was dire, causing due diligence to be undertaken hastily, systems developed. In addition, the need for cybersecurity professionals skilled in understanding cloud technology exists but there is currently no process to upskill in cloud security.
Goals
Selection Process
Schedule
b. Tie CCM, CAIQ, Top Threats, ENISA to module
c. Real world examples of what can go wrong if controls are not present
4. Session 16 - final session
a. CCM
b. ENISA
c. CCSK prep - group to self-help and answer
5. One quiz per session (10 or questions)
CSA Guidance for Critical Areas of Focus in Cloud Computing V 4.0
Domain 1: Cloud Computing Concepts and Architectures
Domain 2: Governance and Enterprise Risk Management
Domain 3: Legal Issues, Contracts and Electronic Discovery
Domain 4: Compliance and Audit Management
Domain 5: Information Governance
Domain 6: Management Plane and Business Continuity
Domain 7: Infrastructure Security
Domain 8: Virtualization and Containers
Domain 9: Incident Response
Domain 10: Application Security
Domain 11: Data Security and Encryption
Domain 12: Identity, Entitlement, and Access Management
Domain 13: Security as a Service
Domain 14: Related Technologies
Overview
There has always been a worldwide shortage and demand for cybersecurity personnel. The pandemic lockdown saw an increase in cloud usage and greater cloud adoption. Many enterprises pivoted to the cloud to take advantage of its elasticity, scalability and agility to enhance their time to market. The shortage of cloud professionals was dire, causing due diligence to be undertaken hastily, systems developed. In addition, the need for cybersecurity professionals skilled in understanding cloud technology exists but there is currently no process to upskill in cloud security.
Goals
- Create a cohort that enhances each other’s learning and growth
- Cohort members are able to pass the CCSK exam
- Cohort members facilitate and support their own cohort
- Upon successful completion of time in cohort, members will receive a CCSK examination token for two attempts to pass the CCSK v4
Selection Process
- Individuals apply for selection into cohort
- Individuals may be interviewed to determine their interest in cloud technologies
- Selection made by CSA volunteers and a few weeks before commencement
Schedule
- Total 16 sessions, first session will cover introduction
- Each session will be of 2 hours
- Each of the next 14 sessions (sessions 2-15) will cover each of the modules in CSA’s Guidance document
b. Tie CCM, CAIQ, Top Threats, ENISA to module
c. Real world examples of what can go wrong if controls are not present
4. Session 16 - final session
a. CCM
b. ENISA
c. CCSK prep - group to self-help and answer
5. One quiz per session (10 or questions)
CSA Guidance for Critical Areas of Focus in Cloud Computing V 4.0
Domain 1: Cloud Computing Concepts and Architectures
Domain 2: Governance and Enterprise Risk Management
Domain 3: Legal Issues, Contracts and Electronic Discovery
Domain 4: Compliance and Audit Management
Domain 5: Information Governance
Domain 6: Management Plane and Business Continuity
Domain 7: Infrastructure Security
Domain 8: Virtualization and Containers
Domain 9: Incident Response
Domain 10: Application Security
Domain 11: Data Security and Encryption
Domain 12: Identity, Entitlement, and Access Management
Domain 13: Security as a Service
Domain 14: Related Technologies
Organizer
Participating Organizations