SlideShare a Scribd company logo
1 of 11
Download to read offline
CCSK
Certification
Hello!
I am Yevhenii Kurii
Information Security Consultant
ELEKS
2
Validate
your competence gained through
experience in industry
Demonstrate
your technical knowledge and skills
Differentiate
yourself from other candidates in the
fast-growing security market
Increase
credibility of your company and trust
when working with clients and vendors
3
«CCSK, OSCP, CISSP Certifications – an advantage»
4
«The following industry certifications are desirable:
CISSP, CISM, CCSK, CSA STAR, GCIH, GCIA, GSEC, CEH,
GIAC»
«Good working knowledge of cloud security (ideally
CCSP or CCSK qualified.)»
«Certification: CISSP, CISA, ISO 27001 LA, CCSK will be
a significant advantage»
«CISA/CISM/CISSP/CCSK/CCSP certification is preferred»
CCSKCertificate of Cloud Security Knowledge
5
Let’s review some
benefits
Transparent
▪ purchase an exam token
▪ register for exam
▪ take a test
▪ become CCSK certified
Infinite
There is no validity period.
Recognised
It is industry’s primary
benchmark for measuring cloud
security skillsets
Not so expensive
$395 for two attempts.
No additional requirements.
6
7
GOAL
To gather people who have some
experience in the field and are aming to
gain the certificate
8
Format
Individual presentations, discussions
Place
ELEKS
Timing
1-1.5 h. two times per week (8 weeks)
9
Use CSA LVIV CHAPTER
page for registration
Thanks!
Any questions?
You can find me at
11
Yevhenii Kurii
Yevhenii Kurii
😉

More Related Content

Similar to CCSK certification (Yevhenii Kurii)

CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
CRAW CYBER SECURITY PVT LTD
 

Similar to CCSK certification (Yevhenii Kurii) (20)

Cloud security certifications landscape
Cloud security certifications landscapeCloud security certifications landscape
Cloud security certifications landscape
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
 
SC-900+2022.pdf
SC-900+2022.pdfSC-900+2022.pdf
SC-900+2022.pdf
 
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fields
 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
 
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
20230224 ARMA Sunshine The Best Certifications for Records Managers.pptx
 
123930653 cisa
123930653 cisa123930653 cisa
123930653 cisa
 
Score Report CCNA
Score Report CCNAScore Report CCNA
Score Report CCNA
 
Top Cybersecurity Certs
Top Cybersecurity CertsTop Cybersecurity Certs
Top Cybersecurity Certs
 
Cissp training program
Cissp training program Cissp training program
Cissp training program
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Cissp why
Cissp whyCissp why
Cissp why
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?How cisco ccie certification can transform your career ?
How cisco ccie certification can transform your career ?
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
Scope of making a career in the cybersecurity industry.pptx
Scope of making a career in the cybersecurity industry.pptxScope of making a career in the cybersecurity industry.pptx
Scope of making a career in the cybersecurity industry.pptx
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 
The 10 Best Trending IT Certifications | Future Education Magazine
The 10 Best Trending IT Certifications | Future Education MagazineThe 10 Best Trending IT Certifications | Future Education Magazine
The 10 Best Trending IT Certifications | Future Education Magazine
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

CCSK certification (Yevhenii Kurii)