Live Online (VILT) & Classroom Corporate Training Course

edForce New Partnership with CSA

Master advanced cloud security techniques through hands-on labs and real-world scenarios in the CCSK Plus Course.

How can we help you?

  • CloudLabs

  • Projects

  • Assignments

  • 24x7 Support

  • Lifetime Access



The CCSK Plus Course expands upon the CCSK Foundation course by incorporating advanced topics and hands-on labs. Participants simulate securing a fictional organization’s migration to the cloud, applying practical skills in a real-world context.


By the end of this course, leaner will be able to:

  • Master foundational cloud security practices.
  • Implement advanced IAM strategies and monitoring techniques.
  • Secure network configurations and virtual instances.
  • Apply encryption and storage security best practices.
  • Build and secure multi-tier cloud applications with federated identity.


  • Familiarity with basic cloud computing concepts.
  • Understanding of fundamental cybersecurity principles.
  • Experience in using cloud platforms (preferably AWS, Azure, or Google Cloud).
  • Basic knowledge of identity and access management (IAM).
  • Comfortable with command line interfaces (CLI) and basic scripting.

Course Outline

Module 1: Core Account Security2024-06-20T22:15:37+05:30
  • Configuring initial security settings in a new cloud account.
  • Implementing MFA, basic monitoring, and IAM controls.
Module 2: IAM and Monitoring In-Depth2024-06-20T22:16:55+05:30
  • Advanced IAM configurations including Attribute Based Access Controls (ABAC).
  • Setting up comprehensive security alerting and monitoring at scale.
Module 3: Network and Instance Security2024-06-20T22:18:18+05:30
  • Creating and securing a Virtual Private Cloud (VPC).
  • Launching and securing virtual machine instances.
  • Conducting vulnerability assessments and managing instance connectivity.
Module 4: Encryption and Storage Security2024-06-20T22:19:44+05:30
  • Deploying encrypted storage volumes with customer managed keys.
  • Securing data backups and snapshots.
Module 5: Application Security and Federation2024-06-20T22:20:41+05:30
  • Building a two-tier application securely in the cloud.
  • Implementing federated identity with OpenID for application access.
Module 6: Risk and Provider Assessment2024-06-20T22:21:52+05:30
  • Using CSA Cloud Controls Matrix and STAR registry for cloud provider evaluation.
  • Assessing and managing risks associated with cloud service providers.


Go to Top