(ISC)² CCSP Training Course

Officially Accredited Bootcamp

The Gold Standard in Cloud Security Training

Our 4-day CCSP training course provides everything you'll need to pass the (ISC)² CCSP certification exam. You’ll leave class with a comprehensive understanding of cloud computing, security risks, and mitigation strategies – all in accordance with the official (ISC)² CCSP Common Body of Knowledge (CBK).


Live Instructor


Our most interactive learning mode provides maximum face to face interaction

From $3390

Live Online


Attend a course delivered by a live instructor from the comfort of your home or office

From $3390


Group Training


Get your whole team (ISC)² CCSP certified. Our world-class instructors can deliver interactive group training on-site or virtually.


(ISC)² CCSP Training

This course is a great complement to the CISSP, providing knowledge in six security domains specific to cloud technologies: legal risk and compliance, cloud architecture and design, cloud data security, cloud platform and infrastructure security, cloud application security, and cloud security operations. Exam voucher included.


Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

Need training for a group?


This course features an in-depth look at the six domains that largely make up the (ISC)² CCSP certification exam:

  • Cloud Concepts, Architecture and Design
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Cloud Security Operations
  • Legal, Risk, and Compliance

While there aren’t any formal prerequisites to take the (ISC)² CCSP training course itself, the certification exam does require a minimum of five years cumulative paid work experience in IT, including three years of information security experience and at least one year in one or more of the six CCSP domains.

It’s a 4-day bootcamp training course.

A few days before class, you will receive an email with details on how to access our virtual training room, and physical courseware will be delivered to your shipping address.

Our virtual classes are instructed in a way that mirrors the experience you would get from an in-person course. As such, we believe in and use lots of interactive learning techniques with no more than 20 minutes of lecture at a time. That way, students remain fully engaged and the information sticks! Our virtual training courses are packed with interactive whiteboards, breakout rooms, virtual sticky note walls, and more to help ensure your success on the exam.

Individuals who hold the PMP certification will earn 32 PDUs through the training course.

You’ll get a course book, practice (ISC)² CCSP exam questions, and an exam voucher. Of course, your tuition also includes priceless group activities, as well as discussions and bagels.

Our (ISC)² CCSP training course is designed for IT and information security leaders who are responsible for applying security practices to cloud-based systems. Security engineers, architects, administrators, managers, and consultants can all benefit form this course. That said, it’s a good course for anyone interested in learning more about the six domains or sitting for the (ISC)² CCSP certification exam.

The CCSP exam uses Computerized Adaptive Testing (CAT) for all English exams. CCSP exams in all other languages are administered as linear, fixed-format exams.

Length of exam: 3 hours
Number of questions: 125 multiple choice
Passing grade: 700 or higher

As an (ISC)² member or associate, you must earn CPEs to actively maintain your security administration certification. All CPE activities must be completed or earned during the three years of each certification cycle and no later than the certification expiration date (the end of your certification cycle).

At the end of the three-year certification cycle, when both required CPE credits and Annual Maintenance Fee (AMF) payment requirements are met, your membership will renew to a new three-year certification cycle.


  • Understand cloud computing concepts
  • Describe cloud reference architecture
  • Understand security concepts relevant to cloud computing
  • Understand design principles of secure cloud computing
  • Identify trusted cloud services
  • Understand cloud data lifecycle
  • Design and implement cloud data storage architectures
  • Design and apply data security strategies
  • Understand and implement data discovery and classification technologies
  • Design and implement relevant jurisdictional data protections for personally identifiable information (PII)
  • Design and implement data rights management
  • Plan and implement data retention, deletion, and archiving policies
  • Design and implement auditability, traceability and accountability of data events
  • Comprehend cloud infrastructure components
  • Analyze risks associated to cloud infrastructure
  • Design and plan security controls
  • Plan disaster recovery and business continuity management
  • Recognize the need for training and awareness in application security
  • Understand cloud software assurance and validation
  • Use verified secure software
  • Comprehend the software development life-cycle (SDLC) process
  • Apply the secure software development life-cycle
  • Comprehend the specifics of cloud application architecture
  • Design appropriate identity and access management (IAM) solutions
  • Support the planning process for the data center design
  • Implement and build physical infrastructure for cloud environment
  • Run physical infrastructure for cloud environment
  • Manage physical infrastructure for cloud environment
  • Build logical infrastructure for cloud environment
  • Run logical infrastructure for cloud environment
  • Manage logical infrastructure for cloud environment
  • Ensure compliance with regulations and controls (e.g., ITIL, ISO/IEC 20000-1)
  • Conduct risk assessment to logical and physical infrastructure
  • Understand the collection, acquisition and preservation of digital evidence
  • Manage communication with relevant parties
  • Understand legal requirements and unique risks within the cloud environment
  • Understand privacy issues, including jurisdictional variation
  • Understand audit process, methodologies, and required adaptions for a cloud environment
  • Understand implications of cloud to enterprise risk management
  • Understand outsourcing and cloud contract design
  • Execute vendor management

Why Beyond20

How We Teach

People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.

All of our cybersecurity instructors are experienced practitioners with real world security expertise. (Real experience, too. Like, Active DoD Secret Clearance experience.)

We're a US-based organization with offices in DC, Phoenix, and San Diego.

Industry-Leading Course Materials

All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.

We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.

We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!

Related Resources