Certified Cloud Security Engineer
Developed with cloud security experts, the EC-Council C|CSE course blends vendor-neutral cloud security principles, frameworks, and practices with vendor-specific configuration for AWS, Azure, and GCP. Balancing theory and practice, it covers securing cloud infrastructure with regulations and standards. C|CSE is ideal for beginners and experienced cybersecurity pros.



This Course Is Ideal For
Network Security Engineer
Cyber Security Analyst
Network Security Analyst
Cloud Administrator/ Engineer
Network Security Administrator
Cloud Analyst
Cyber Security Engineer
Profiles with network / cloud management and operations
Network Security Engineer
Cyber Security Analyst
Network Security Analyst
Cloud Administrator/ Engineer
Network Security Administrator
Cloud Analyst
Cyber Security Engineer
Profiles with network / cloud management and operations
Network Security Engineer
Cyber Security Analyst
Network Security Analyst
Cloud Administrator/ Engineer
Network Security Administrator
Cloud Analyst
Cyber Security Engineer
Profiles with network / cloud management and operations
What to Expect In This Course
SKILL LEVEL
Intermediate
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English
Skill You Will Learn
Plan, implement, and execute cloud platform security for an organization.
Securely access cloud resources through identity and access management (IAM).
Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.
Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.
Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP. • Understand the shared responsibility model of the service provider.
Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.
Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization's cloud services.
Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.
Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).
Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.
Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.
Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.
Understand the legal implications associated with cloud computing to protect organizations.
Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.
Understand and implement security for private, multi-tenant, and hybrid cloud environments.
Plan, implement, and execute cloud platform security for an organization.
Securely access cloud resources through identity and access management (IAM).
Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.
Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.
Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP. • Understand the shared responsibility model of the service provider.
Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.
Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization's cloud services.
Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.
Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).
Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.
Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.
Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.
Understand the legal implications associated with cloud computing to protect organizations.
Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.
Understand and implement security for private, multi-tenant, and hybrid cloud environments.
Plan, implement, and execute cloud platform security for an organization.
Securely access cloud resources through identity and access management (IAM).
Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.
Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.
Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP. • Understand the shared responsibility model of the service provider.
Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.
Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization's cloud services.
Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.
Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).
Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.
Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.
Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.
Understand the legal implications associated with cloud computing to protect organizations.
Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.
Understand and implement security for private, multi-tenant, and hybrid cloud environments.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Appendix (Self-Study)
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Appendix (Self-Study)
Outcomes of the Course
By the end of this course, participants will be able to:
Grasp core cloud security principles across major platforms like AWS, Azure, and GCP.
Secure, operate, and defend cloud environments through hands-on application of security tools and techniques.
Identify, assess, and mitigate security vulnerabilities and threats specific to various cloud deployment and service models.
Manage the entire lifecycle of incident response within cloud environments, including detection and reaction strategies.
Protect data at rest and in transit using cloud-native encryption and key management services.
Configure robust access control and IAM across diverse cloud providers.
Design and apply Governance, Risk Management, and Compliance frameworks in cloud services.
Perform security audits and penetration tests to ensure compliance and identify weaknesses in cloud infrastructures.
Create and implement effective business continuity and disaster recovery solutions for cloud-based systems.
By the end of this course, participants will be able to:
Grasp core cloud security principles across major platforms like AWS, Azure, and GCP.
Secure, operate, and defend cloud environments through hands-on application of security tools and techniques.
Identify, assess, and mitigate security vulnerabilities and threats specific to various cloud deployment and service models.
Manage the entire lifecycle of incident response within cloud environments, including detection and reaction strategies.
Protect data at rest and in transit using cloud-native encryption and key management services.
Configure robust access control and IAM across diverse cloud providers.
Design and apply Governance, Risk Management, and Compliance frameworks in cloud services.
Perform security audits and penetration tests to ensure compliance and identify weaknesses in cloud infrastructures.
Create and implement effective business continuity and disaster recovery solutions for cloud-based systems.
By the end of this course, participants will be able to:
Grasp core cloud security principles across major platforms like AWS, Azure, and GCP.
Secure, operate, and defend cloud environments through hands-on application of security tools and techniques.
Identify, assess, and mitigate security vulnerabilities and threats specific to various cloud deployment and service models.
Manage the entire lifecycle of incident response within cloud environments, including detection and reaction strategies.
Protect data at rest and in transit using cloud-native encryption and key management services.
Configure robust access control and IAM across diverse cloud providers.
Design and apply Governance, Risk Management, and Compliance frameworks in cloud services.
Perform security audits and penetration tests to ensure compliance and identify weaknesses in cloud infrastructures.
Create and implement effective business continuity and disaster recovery solutions for cloud-based systems.
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module Title 9
Module Title 10
Module Title 11