1. Home
  2. CrowdStrike
  3. CCCS-203b Exam Syllabus

CrowdStrike CCCS-203b Exam Syllabus

Start Free CCCS-203b Exam Practice After Reviewing the Topics

Before starting your CCCS-203b exam preparation, it is recommended to review the complete CrowdStrike Certified Cloud Specialist exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free CCCS-203b questions. We also provide premium CCCS-203b practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

CrowdStrike CCCS-203b Exam Objectives

Section Objectives
Falcon Cloud Security Features and Services
  • 1.1 Explain the benefits of CrowdStrike's cloud security products and services — including cloudsecurity posture management (CSPM), cloud workload protection (CWP), application security posture management (ASPM), data security posture management (DSPM), and infrastructure as code (laC) security — and how they work together
  • 1.2 Describe the purpose and use requirements of one-click sensor deployment
  • 1.3 Describe the purpose and use requirements of the Kubernetes admission controller
Cloud Account Registration
  • 2.1 Given a specific use case, determine the most efficient and secure registration method to use for your cloud environment
  • 2.2 Determine which roles are required to perform actions with CrowdStrike Falcon® Cloud Security
  • 2.3 Organize cloud resources into cloud groups to reduce noise and assign responsibility
  • 2.4 Configure cloud security scan exclusion settings
  • 2.5 Troubleshoot issues related to cloud account registrations 
Cloud Security Policies and Rules
  • 3.1 Given a use case, configure CSPM policies
  • 3.2 Given a use case, recommend an image assessment policy and exclusions
  • 3.3 Given a use case, recommend a Kubernetes admission controller policy configuration
  • 3.4 Given a use case, recommend a runtime sensor policy configuration
Pre-Runtime Protection
  • 4.1 Add, edit and delete registry connection details and settings
  • 4.2 Given a use case, recommend an appropriate image assessment method for your environment
  • 4.3 Identify potential security issues — such as malware presence, high-severity Common Vulnerabilities and Exposures (CVEs), detected leaked secrets and Docker file misconfigurations — from the image assessment report
  • 4.4 Identify vulnerabilities and installed packages
Runtime Protection
  • 5.1 Determine the best CrowdStrike Falcon® sensor to use when given a specific Kubernetes and container environment configuration
  • 5.2 Troubleshoot issues related to Kubernetes and container sensor deployment
  • 5.3 Identify deployment misconfigurations
  • 5.4 Identify unassessed images used in production
  • 5.5 Identify indicators of attack (IOAs), rogue containers and drift
  • 5.6 Identify network connections
Findings and Detection Analysis
  • 6.1 Evaluate cloud security controls and configurations to identify indicators of misconfiguration (IOMs), vulnerabilities and/or high-risk practices
  • 6.2 Identify suspicious/malicious activity (IOAs) and associated persistence mechanisms
  • 6.3 Audit user account activity and permissions to identify risks
  • 6.4 Compare cloud, Docker and Kubernetes configurations to the latest industry benchmarks to determine compliance
  • 6.5 Find unmanaged, public-facing cloud and container assets
Remediating and Reporting Issues
  • 7.1 Identify recommended remediation steps for findings and detections
  • 7.2 Describe the purpose and use requirements of scheduled reports for cloud security
  • 7.3 Describe the purpose and use requirements of CrowdStrike Falcon® Fusion SOAR workflows to notify individuals about cloud-related policies, detections, incidents, infrastructure as code and image assessments
Official Information https://assets.crowdstrike.com/is/content/crowdstrikeinc/cccs-certification-exam-guidepdf