What Is the CCSP Certification?
The Certified Cloud Security Professional (CCSP) certification is an information technology certification that tests applicants’ knowledge of cloud security topics. It is administered by the International Information System Security Certification Consortium, (ISC)2, and was developed in partnership with the Cloud Security Alliance (CSA).
The CCSP is designed as a certification for mid-level security professionals who want to demonstrate their proficiency in the field of cloud security. It is similar to the (ISC)2 CISSP exam in choice of topics and difficulty but focuses on cloud security.
How Does the CCSP Certification Differ From Other IT Certifications?
The CCSP certification is one of the few certifications focusing specifically on cloud security. Many other IT certifications take a generalist approach to security topics or have a deep level of focus in another area within the domain of information security (digital forensics, reverse engineering and so on). In contrast, the CCSP exam is designed to test knowledge of the application of cybersecurity tools, techniques and procedures to cloud computing. A fair amount of focus is placed on drawing attention to the points where the use of cloud computing requires a different approach to security.
The CCSP is far from the only cloud-focused certification available. Several other certifications have been developed by cloud vendors and other certification organizations to test candidates’ knowledge of cloud computing concepts and technology. However, the CCSP’s focus on cloud security helps to differentiate it from these other certifications.
The most similar certification to the CCSP is the Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK). The CSA partnered with (ISC)2 to create the CCSP exam. According to the CSA blog, the CCSP covers much of the same content covered by the CCSK but also tests knowledge of governance, traditional security, (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Howard Poston. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Lx4NZBTvwrY/