Achieve more in your career.

You prove every day that you have what it takes to secure critical assets in the cloud. But our profession is always changing, and even the brightest minds can benefit from having a guide on the journey to success. (ISC)² is here to help you discover the right path, create your plan and thrive throughout your career. The Ultimate Guide to the CCSP covers everything to know about the world’s leading cloud security certification. See how the CCSP – and (ISC)² – can differentiate you as a globally respected security leader.

In this guide, the following will be addressed:

  • Is the CCSSP right for me?

  • CCSPs from around the globe

  • Fast facts about CCSP

  • Benefits of being CCSP-Certified

  • Benefits of (ISC)² Membership

  • CCSP exam overview

  • Official CCSP training

  • Pathway to CCSP Certification

  • Free CPE opportunities

Is the CCSP right for me?

The CCSP is ideal for IT and information security leaders seeking to prove their understanding of cybersecurity and securing critical assets in the cloud. It shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud.

Experience

To qualify for the CCSP, candidates must pass the exam and have at least five years of cumulative, paid work experience in information technology, of which three years must be in information security, and one year in one or more of the six domains of the (ISC)² CCSP Common Body of Knowledge (CBK®).A candidate who doesn’t yet have the required experience to become a CCSP may become an Associate of (ISC)² after successfully passing the CCSP exam. The associate of (ISC)² will then have six years to earn the experience needed for the CCSP certification.

You can download the full guide here.



Feature Articles


Blog
2024-2025 Government Budget: Focusing investment in cyber security skilling
By Jeremy Daly | 1 July 2024
Blog
The Growing Importance of Management Skills and the AMA CPM Certification in 2024
By Gary Duffield | 29 July 2024
Blog
The ASD’s Essential Eight: How to Implement Cyber Security Strategies with Training
By Leif Pedersen | 14 October 2024
Blog
5 Common RPL Challenges and How to Overcome Them
By Shanil Sharma | 15 August 2024
Blog
Transforming Your Business and Workforce with Microsoft AI Training
By Leif Pedersen | 30 July 2024
Blog
Security maturity is not a technical-only problem - invest in your people
By Jeremy Daly | 11 November 2024