Cloud Security Alliance APAC
  • Home
  • About
    • About Us & Our Team
    • APAC Chapters
    • Newsletter
  • Press Release
  • Research
    • APAC Research Advisory Council (APRAC)
    • APAC Research Initiatives
    • Reports
    • C-STAR
  • Training
    • CCSK Success Stories
  • Events
    • Past & Upcoming Events
    • CXO Roundtable Series
  • CONTACT
    • Contact Us
    • Privacy Notice
  • Home
  • About
    • About Us & Our Team
    • APAC Chapters
    • Newsletter
  • Press Release
  • Research
    • APAC Research Advisory Council (APRAC)
    • APAC Research Initiatives
    • Reports
    • C-STAR
  • Training
    • CCSK Success Stories
  • Events
    • Past & Upcoming Events
    • CXO Roundtable Series
  • CONTACT
    • Contact Us
    • Privacy Notice

CSA PayForward Training on Cloud Security Program


Scheme to Nurture Cloud Security Literate Personnel
​
Overview
There has always been a worldwide shortage and demand for cybersecurity personnel. The pandemic lockdown saw an increase in cloud usage and greater cloud adoption. Many enterprises pivoted to the cloud to take advantage of its elasticity, scalability and agility to enhance their time to market. The shortage of cloud professionals was dire, causing due diligence to be undertaken hastily, systems developed. In addition, the need for cybersecurity professionals skilled in understanding cloud technology exists but there is currently no process to upskill in cloud security.

Goals
  • Create a cohort that enhances each other’s learning and growth
  • Cohort members are able to pass the CCSK exam
  • Cohort members facilitate and support their own cohort
  • Upon successful completion of time in cohort, members will receive a CCSK examination token for two attempts to pass the CCSK v4

Selection Process
  • Individuals apply for selection into cohort
  • Individuals may be interviewed to determine their interest in cloud technologies
  • Selection made by CSA volunteers and a few weeks before commencement

Schedule
  1. Total 16 sessions, first session will cover introduction
  2. Each session will be of 2 hours
  3. Each of the next 14 sessions (sessions 2-15) will cover each of the modules in CSA’s Guidance document
     a. Cohort member assigned to module will present relevant points in module
     b. Tie CCM, CAIQ, Top Threats, ENISA to module
     c. Real world examples of what can go wrong if controls are not present
     4. Session 16 - final session
     a. CCM
     b. ENISA
     c. CCSK prep - group to self-help and answer
      5. One quiz per session (10 or questions) 

CSA Guidance for Critical Areas of Focus in Cloud Computing V 4.0
Domain 1: Cloud Computing Concepts and Architectures
Domain 2: Governance and Enterprise Risk Management
Domain 3: Legal Issues, Contracts and Electronic Discovery
Domain 4: Compliance and Audit Management
Domain 5: Information Governance
Domain 6: Management Plane and Business Continuity
Domain 7: Infrastructure Security
Domain 8: Virtualization and Containers
Domain 9: Incident Response
Domain 10: Application Security
Domain 11: Data Security and Encryption
Domain 12: Identity, Entitlement, and Access Management
Domain 13: Security as a Service
Domain 14: Related Technologies



Organizer
Picture
Participating Organizations
Picture
© COPYRIGHT 2022. Cloud Security Alliance. All Right Reserved