Skip to main content

Certificate of Cloud Auditing Knowledge (CCAK) Certification Training

Code: 2042 Category: Tag:

In this course, you will learn the essential principles of auditing cloud computing systems to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).

The CCAK Certification training program was developed by the Cloud Security Alliance, the global leader in cloud security best practices, in partnership with ISACA, an international professional association focused on IT audit, security, cybersecurity, risk, privacy, and governance.

CCAK Certification Training Delivery Methods

In-Person

Online

CCAK Certification Training Benefits

Ensure the right controls for confidentiality, integrity, and accessibility

Mitigate risks and costs of audit management and penalties for non-compliance.

Enhance organizational reputation and customer trust

Follow the Official ISACA Curriculum

Continue learning and face new challenges with after-course one-on-one instructor coaching

CCAK Certification Training Outline
Module 1: Cloud Governance

In this module, you will learn about the basics of cloud governance, including:  

Assurance 
Governance Frameworks 
Risk Management 
Governance Tools 
Module 2: Cloud Compliance Program
Module 3: CCM And CAIQ Goals, Objectives, and Structure
Module 4: Threat Analysis Methodology for Cloud Using CCM
Module 5: Evaluating A Cloud Compliance Program
Module 6: Cloud Auditing
Module 7: CCM Auditing Controls
Module 8: Continuous Assurance and Compliance
Module 9: STAR Program

Request Quotes

Register now
CAPTCHA image

Please type the characters This helps us prevent spam, thank you.

SAFe® Lean Portfolio Management Training

Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW)

Managing PKI Training

OpenShift Enterprise Administration (DO280)

Introduction to Microsoft Excel Training

Deploying Cisco Connected Mobile Experiences (WCMX)

FPM 233 Training: Applications in Business, Cost & Financial Management

Navigating CMMC (Cybersecurity Maturity Model) Requirements Training

Certified Ethical Hacker (CEH) Training

DevSecOps Foundation (DSOF) Certification Training

arالعربية