The Cloud Security Alliance CCSK exam preparation guide is designed to provide candidates with necessary information about the CCSK Foundation exam. It includes exam summary, sample questions, practice test, objectives and ways to interpret the exam objectives to enable candidates to assess the types of questions-answers that may be asked during the CSA Certificate of Cloud Security Knowledge (CCSK) exam.
It is recommended for all the candidates to refer the CCSK objectives and sample questions provided in this preparation guide. The Cloud Security Alliance CCSK Foundation certification is mainly targeted to the candidates who want to build their career in Fundamentals domain and demonstrate their expertise. We suggest you to use practice exam listed in this cert guide to get used to with exam environment and identify the knowledge areas where you need more work prior to taking the actual CSA Certificate of Cloud Security Knowledge exam.
Cloud Security Alliance CCSK Exam Summary:
Exam Name
|
CSA Certificate of Cloud Security Knowledge (CCSK Foundation) |
Exam Code | CCSK |
Exam Price | $445 USD |
Duration | 120 minutes |
Number of Questions | 60 |
Passing Score | 80% |
Recommended Training / Books | CCSK Training |
Schedule Exam | PEARSON VUE |
Sample Questions | Cloud Security Alliance CCSK Sample Questions |
Recommended Practice | CSA Certificate of Cloud Security Knowledge (CCSK) Practice Test |
Cloud Security Alliance CCSK Foundation Syllabus:
Section | Objectives |
---|---|
Cloud Computing Concepts & Architectures |
- Defining Cloud Computing - Cloud Computing Models - Cloud Security Scope, Responsibilities, & Models |
Cloud Governance
|
- Cloud Governance - The Governance Hierarchy - Cloud Security Frameworks - Policies |
Risk, Audit and Compliance |
- Cloud Risk Management - Compliance & Audit - Governance, Risk, Compliance Tools & Technologies |
Organization Management |
- Organization Hierarchy Models |
Identity and Access Management
|
- How IAM Is Different in the Cloud - Fundamental Terms - Federation - Strong Authentication & Authorization |
Security Monitoring |
- Cloud Monitoring - Beyond Logs - Posture Management - Cloud Telemetry Sources - Collection Architectures - AI for Security Monitoring |
Infrastructure & Networking |
- Cloud Infrastructure Security |
Cloud Workload Security |
- Introduction to Cloud Workload Security - Securing Virtual Machines - Securing Containers - Securing Serverless and Function as a Service - Securing AI Workloads |
Data Security |
- Primer on Cloud Storage - Data Security Tools and Techniques - Cloud Data Encryption at Rest - Data Security Posture Management - Object Storage Security - Data Security for Artificial Intelligence |
Application Security |
- Secure Development Lifecycle - Architecture’s Role in Secure Cloud Applications - Identity & Access Management and Application Security - DevOps & DevSecOps |
Incident Response & Resilience
|
- Incident Response - Preparation - Detection & Analysis - Containment, Eradication, & Recovery - Post Incident Analysis |
Related Technologies & Strategies
|
- Zero Trust - Artificial Intelligence |