Course Overview –
The Lead Cloud Security Manager training course enables participants to develop the competence needed to implement and manage a cloud security program by following widely recognized best practices.
The growing number of organizations that support remote work has increased the use of cloud computing services, which has, in turn, increased the demand for a secure cloud infrastructure proportionally.
Lead Cloud Security Manager | ISO/IEC 27017 & ISO/IEC 27018
Format: Self-Study
Duration: Self-Paced

Why should you attend?
This training course is designed to help participants acquire the knowledge and skills needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018. It provides a comprehensive elaboration of cloud computing concepts and principles, cloud computing security risk management, cloud-specific controls, cloud security incident management, and cloud security testing.
The training course is followed by the certification exam. If you successfully pass it, you can apply for a “PECB Certified Lead Cloud Security Manager” credential. A PECB Lead Cloud Security Manager Certificate demonstrates your ability and competencies to manage a cloud security program based on best practices.
Who should attend?
- Cloud security and information security professionals seeking to manage a cloud security program
- Managers or consultants seeking to master cloud security best practices
- Individuals responsible for maintaining and managing a cloud security program
- Technical experts seeking to enhance their cloud security knowledge
- Cloud security expert advisors
Learning objectives
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a cloud security program
- Acknowledge the correlation between ISO/IEC 27017, ISO/IEC 27018, and other standards and regulatory frameworks
- Gain the ability to interpret the guidelines of ISO/IEC 27017 and ISO/IEC 27018 in the specific context of an organization
- Develop the necessary knowledge and competence to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program
- Acquire the practical knowledge to advise an organization in managing a cloud security program by following best practices
Educational approach
- The training course contains essay-type exercises, multiple-choice quizzes, and examples of cloud security best practices.
- The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes is similar to that of the certification exam.
Related Courses

ISO/IEC 27032 Lead Cybersecurity Manager
Course Overview - ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and

ISO/IEC 27032 Cybersecurity Foundation
Course Overview - Become acquainted with the best practices of the Cybersecurity implementation and management program

ISO/IEC 27017 Lead Cloud Security Manager
Course Overview - The Lead Cloud Security Manager training course enables participants to develop the competence
Requirements
- The main requirement for participating in this training course is having a fundamental understanding of ISO/IEC 27017 and ISO/IEC 27018 and a general knowledge of cloud computing concepts.
Features
- Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits
- Managers or consultants seeking to master an Information Security Management System audit process
- Individuals responsible for maintaining conformance with Information Security Management System requirements
- Technical experts seeking to prepare for an Information Security Management System audit
- Expert advisors in Information Security Management
Target audiences
- Project managers and consultants involved in and concerned with the implementation of an ISMS
- Expert advisors seeking to master the implementation of an ISMS
- Individuals responsible for ensuring conformity to information security requirements within an organization
- Members of an ISMS implementation team