Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: CCSP For Dummies

Uday Mittal July 5, 2022

Book Review: CCSP For Dummies

CCSP for DummiesI recently enrolled for the Certified Cloud Security Professional certification by (ISC)2. One of the books recommended to me for preparing for this certification was CCSP for Dummies by Arthur J. Deane. It was published in November 2020 by For Dummies publication (a brand of John Wiley & Sons, Inc). I will not go into details of the CCSP certification. I will say this though, content-wise there is a lot of overlap between CCSP and CISSP.  If you want to learn more about it, check out this guide.

Content Overview

The book is divided into three parts spanning ten chapters.

  • Starting your CCSP journey – This part encompasses first two chapters of the book. In these chapters, the author has provided an overview of CCSP certification and some information security fundamentals.
  • Exploring the CCSP Certification Domains – This part encompasses chapters three to eight. Each chapter covers one of the following domains of the certification:
    • Cloud concepts, architecture and design
    • Cloud data security
    • Cloud platform and infrastructure security
    • Cloud application security
    • Cloud security operations
    • Legal, risk and compliance
  • The Part of Tens  – This section encompasses chapters nine to ten. In this part, the author has shared tips for how to prepare for the CCSP certification and ten tips for the exam day.

Salient Features

  • The philosophy behind Dummies series is that they explain complex concepts in an easy to understand manner. Keeping this perspective, this book is a good introduction to the CCSP certification as well as cloud security concepts.
  • It covers most of the content prescribed by (ISC)2 for the CCSP certification and it is (ISC)2 approved.
  • It comes with 2 practices tests and 100 flash cards to help study for the exam.
  • It is good for people new to cloud security.

Not so salient Features

  • It is highly repetitive and the content is not well organized within chapters 3-8.
  • The language is easy to understand but I felt that it was written in a rushed manner.

My rating 3.3 / 5.0

Join our book club on Discord and share your views on this book (or any other security book of your choice).

Other book reviews

  • Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham
  • Practical Threat Intelligence and Data-driven threat hunting by Valentina Costa-Gazcón
  • Hacking APIs by Corey Ball
  • Pentesting Azure Applications by Matt Burrough
  • Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen
  • Red Team Development and Operations by Joe Vest and James Tubberville
  • Container Security by Liz Rice
  • Web Application Security by Andrew Hoffman

Related Posts

  • Book Review: How to Hack Like a GHOSTBook Review: How to Hack Like a GHOST
  • Book Review: Pentesting Azure ApplicationsBook Review: Pentesting Azure Applications
mm
Uday Mittal

Uday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity awareness, offensive security research etc. and has authored various articles on topics related to cyber security and software development for a leading magazine on open source software.

Filed Under: Book Reviews, Essential Certifications Tagged With: (ISC)2, ccsp, Cloud security

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Make Remote Access Your Ally
    Make Remote Access Your Ally
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress