RecertHero
ISC2·Certification

CCSP continuing education

Certified Cloud Security Professional. Cloud-focused certification covering architecture, data security, platform security, operations, and legal/compliance for cloud environments.

Renewal cycle

3 years

Between full re-certifications.

Credits required

90 CPE

Roughly 30 CPE per year.

Indexed here

35

Opportunities that map to CCSP.

Opportunities that count

35 results mapped to CCSP, ranked by what's coming up next.

Browse all 35

As organizations continue to rely on hundreds of SaaS applications, traditional security models are struggling to keep up. In this session, Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, shares insights into why SaaS has become a prime target for attackers and where security teams are most likely to lose visibility and control. The discussion focuses on proven approaches for managing SaaS risk, protecting sensitive data, and improving governance without disrupting users. Attendees will learn how to prioritize SaaS security initiatives, align controls with business needs, and build a scalable approach to protecting cloud-based applications in today’s dynamic IT environments. CPE Credit 1 Group A CPE Credit

Apr 22, 2026Free
CCSP+1CISM+1
Webinar·SANS Institute

An end-to-end walkthrough of modern Zero Trust design: identity-aware proxies, micro-segmentation, continuous authorization, and how to evolve a legacy perimeter network without a forklift rewrite.

1 hr 15 minMay 23, 2026Free
CISSP+1.25Security++1.25CCSP+1.25

An auditor's perspective on building a cloud risk register, evidence collection in serverless environments, and translating cloud control gaps into board-ready language.

1 hr 30 minJun 6, 2026Free
CISA+1.5CISM+1.5CCSP+1.5

Practical hardening for production Kubernetes: PSA, NetworkPolicies, admission webhooks, audit logging, and the most common CIS Benchmark gaps you'll find in a real cluster.

1 hrJun 13, 2026Free
CCSP+1CySA++1Security++1

A 2-hour scenario walking through cloud-to-cloud lateral movement (IAM role chaining, service confusion), with mirrored red-team objectives and blue-team detections.

2 hrJun 27, 2026Free
CCSP+2CySA++2CISSP+2

How to Improve Threat Detection and Hunting in the AWS Cloud Using the MITRE ATT&CK Matrix Understanding adversary tactics and techniques based on real-world observations are critical to building more effective threat detection and hunting capabilities. The context provided by data sources is what enables us to make actionable decisions. Still, it is limited to what raw data inputs we consume, as well as consuming enough of the right data to be able to mitigate, remediate and prevent future adversary activity. However, detecting malicious events is not the final solution to thwarting adversaries. Actions need to be taken, whether they are operational (e.g., stopping a malicious process) or strategic (e.g., securing an environment to prevent the execution of malicious processes). In this webinar, SANS and AWS Marketplace will discuss the exercise of applying the MITRE ATT&CK Matrix to the AWS Cloud. They will also explore how to enhance threat detection and hunting in an AWS environment to maintain a strong security posture. Attendees will learn how to:Apply the MITRE ATT&CK Matrix to classify and understand cloud-based techniquesCreate an effective detection strategy and uncover what data sources are requiredBreak down and recognize detections by security product capabilities and data sourcesLeverage threat intel for improved detectionUse AWS services and third-party solutions to support their threat detection and hunting strategy Register today to be among the first to receive the associated whitepaper written by SANS senior instructor and cloud security expert Dave Shackleford.WebinarDigital Forensics and Incident Response Presented: 1 Sep 2020 Technical Presentation View details

Self-pacedFree
CySA++1.5CCSP+1.5Security++1.25

How to Protect All Surfaces and Services in the AWS Cloud Multiple layers of defense are required to protect your AWS environment. The first step is to reduce your overall attack surface to reduce exposure, in ways such as hardening your Amazon EC2 operating systems and configuring your containers. Organizations can then implement tools, such as a cloud security posture management (CSPM) solutions, to monitor and manage risk. In this prerecorded webcast, SANS instructor Dave Shackleford and AWS Marketplace explore best practices and provide practical guidance on how you can secure your entire AWS footprint. They will also present real-world use cases and examples of tools you can leverage to protect your investments. Attendees at this webcast will learn how to:Decrease their attack surface to limit exposureProtect their AWS environment with configuration management, real-time assessment, and access control mechanisms.Implement automation for monitoring and continuous protectionLeverage AWS services and seller solutions in AWS Marketplace to protect AWS services and surfaces Register today to be among the first to receive the associated whitepaper written by SANS senior instructor and cloud security expert Dave Shackleford.WebinarCloud Security Presented: 28 Jul 2020 Technical Presentation View details

Self-pacedFree
CCSP+1.5Security++1.5CISSP+1.25
Vendor training·Microsoft Learn

Implement a defense-in-depth security strategy for AI workloads across Microsoft's AI platform. Configure data security posture management in Microsoft Purview, secure agent identities in Microsoft Entra, and analyze AI identity risks in Microsoft Defender XDR. Then, enable real-time agent protection in Microsoft Defender, configure AI Gateway security in Microsoft Foundry, manage guardrails, protect AI workloads with Defender for Cloud, and govern agents with Microsoft Agent 365.

3 hr 59 minSelf-pacedFree
CCSP+4CISSP+4Security++4

Implement security controls across Azure application platform services—from container workloads to the API layer. Configure Microsoft Defender for Containers, secure Azure Kubernetes Service (AKS), Azure Container Registry (ACR), Container Instances, and Container Apps. Then apply authentication, network access, and policy controls across Azure Function apps, Logic apps, App Services, Web Application Firewall, and Azure API Management.

3 hr 9 minSelf-pacedFree
CCSP+3.25Security++3.25CISSP+3

Microsoft 365 Copilot accesses organizational data to generate responses, which introduces new risks for sensitive information exposure. Learn how to use Microsoft Purview audit, sensitivity labels, and data loss prevention to investigate, classify, and protect data in a Copilot-enabled environment.

2 hr 55 minSelf-pacedFree
CCSP+3CISM+2.75Security++2.75

Organizations need to classify, label, and protect sensitive data to prevent exposure and ensure compliance. Microsoft Purview solutions provide data classification, sensitivity labels, and encryption to secure information across Microsoft 365 and on-premises storage. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

6 hr 16 minSelf-pacedFree
CCSP+6.25CISSP+6.25CISM+6.25

Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.

3 hr 59 minSelf-pacedFree
CISM+4CCSP+4CISA+3.75

Know one we're missing?

Submit any webinar, course, or training URL. We'll classify it with Claude and queue it for review.

Suggest an opportunity

ImportantRecertHero is an independent aggregator. Credit estimates are guidance only — always verify with your certifying body.