Certified Cloud Security Engineer
Certified Cloud Security Engineer
Certified Cloud Security Engineer

Certified Cloud Security Engineer

Developed with cloud security experts, the EC-Council C|CSE course blends vendor-neutral cloud security principles, frameworks, and practices with vendor-specific configuration for AWS, Azure, and GCP. Balancing theory and practice, it covers securing cloud infrastructure with regulations and standards. C|CSE is ideal for beginners and experienced cybersecurity pros.

This Course Is Ideal For

  • Network Security Engineer

  • Cyber Security Analyst

  • Network Security Analyst

  • Cloud Administrator/ Engineer

  • Network Security Administrator

  • Cloud Analyst

  • Cyber Security Engineer

  • Profiles with network / cloud management and operations

  • Network Security Engineer

  • Cyber Security Analyst

  • Network Security Analyst

  • Cloud Administrator/ Engineer

  • Network Security Administrator

  • Cloud Analyst

  • Cyber Security Engineer

  • Profiles with network / cloud management and operations

  • Network Security Engineer

  • Cyber Security Analyst

  • Network Security Analyst

  • Cloud Administrator/ Engineer

  • Network Security Administrator

  • Cloud Analyst

  • Cyber Security Engineer

  • Profiles with network / cloud management and operations

What to Expect In This Course

SKILL LEVEL
Intermediate
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English

Skill You Will Learn

  • Plan, implement, and execute cloud platform security for an organization.

  • Securely access cloud resources through identity and access management (IAM).

  • Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.

  • Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.

  • Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP. • Understand the shared responsibility model of the service provider.

  • Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.

  • Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization's cloud services.

  • Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.

  • Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).

  • Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.

  • Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.

  • Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.

  • Understand the legal implications associated with cloud computing to protect organizations.

  • Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.

  • Understand and implement security for private, multi-tenant, and hybrid cloud environments.

  • Plan, implement, and execute cloud platform security for an organization.

  • Securely access cloud resources through identity and access management (IAM).

  • Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.

  • Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.

  • Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP. • Understand the shared responsibility model of the service provider.

  • Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.

  • Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization's cloud services.

  • Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.

  • Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).

  • Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.

  • Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.

  • Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.

  • Understand the legal implications associated with cloud computing to protect organizations.

  • Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.

  • Understand and implement security for private, multi-tenant, and hybrid cloud environments.

  • Plan, implement, and execute cloud platform security for an organization.

  • Securely access cloud resources through identity and access management (IAM).

  • Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.

  • Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.

  • Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP. • Understand the shared responsibility model of the service provider.

  • Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.

  • Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization's cloud services.

  • Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.

  • Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).

  • Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.

  • Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.

  • Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.

  • Understand the legal implications associated with cloud computing to protect organizations.

  • Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.

  • Understand and implement security for private, multi-tenant, and hybrid cloud environments.

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module 10

Module 11

Appendix (Self-Study)

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module 10

Module 11

Appendix (Self-Study)

Outcomes of the Course

By the end of this course, participants will be able to:

  • Grasp core cloud security principles across major platforms like AWS, Azure, and GCP.

  • Secure, operate, and defend cloud environments through hands-on application of security tools and techniques.

  • Identify, assess, and mitigate security vulnerabilities and threats specific to various cloud deployment and service models.

  • Manage the entire lifecycle of incident response within cloud environments, including detection and reaction strategies.

  • Protect data at rest and in transit using cloud-native encryption and key management services.

  • Configure robust access control and IAM across diverse cloud providers.

  • Design and apply Governance, Risk Management, and Compliance frameworks in cloud services.

  • Perform security audits and penetration tests to ensure compliance and identify weaknesses in cloud infrastructures.

  • Create and implement effective business continuity and disaster recovery solutions for cloud-based systems.

By the end of this course, participants will be able to:

  • Grasp core cloud security principles across major platforms like AWS, Azure, and GCP.

  • Secure, operate, and defend cloud environments through hands-on application of security tools and techniques.

  • Identify, assess, and mitigate security vulnerabilities and threats specific to various cloud deployment and service models.

  • Manage the entire lifecycle of incident response within cloud environments, including detection and reaction strategies.

  • Protect data at rest and in transit using cloud-native encryption and key management services.

  • Configure robust access control and IAM across diverse cloud providers.

  • Design and apply Governance, Risk Management, and Compliance frameworks in cloud services.

  • Perform security audits and penetration tests to ensure compliance and identify weaknesses in cloud infrastructures.

  • Create and implement effective business continuity and disaster recovery solutions for cloud-based systems.

By the end of this course, participants will be able to:

  • Grasp core cloud security principles across major platforms like AWS, Azure, and GCP.

  • Secure, operate, and defend cloud environments through hands-on application of security tools and techniques.

  • Identify, assess, and mitigate security vulnerabilities and threats specific to various cloud deployment and service models.

  • Manage the entire lifecycle of incident response within cloud environments, including detection and reaction strategies.

  • Protect data at rest and in transit using cloud-native encryption and key management services.

  • Configure robust access control and IAM across diverse cloud providers.

  • Design and apply Governance, Risk Management, and Compliance frameworks in cloud services.

  • Perform security audits and penetration tests to ensure compliance and identify weaknesses in cloud infrastructures.

  • Create and implement effective business continuity and disaster recovery solutions for cloud-based systems.

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module Title 9

Module Title 10

Module Title 11