Skip links

Ec-council | Learning

Certified Cloud Security Engineer | CCSE

Certified Cloud Security Engineer (CCSE) is a hands-on course designed and developed by cloud security professionals in collaboration with industry experts around the world. This course includes both neutral and supplier-specific cloud security concepts. Neutral concepts include universally applicable best practices, technologies, frameworks and principles of cloud security that help individuals strengthen their fundamentals. It helps professionals develop and improve their knowledge and skills in planning, configuration, implementation and maintenance of a secure cloud environment for their organizations, while validating their knowledge, skills and capabilities to protect, detect and respond to threats in cloud network infrastructure.

Module 01: Introduction to Cloud Security
Module 02: Platform and infrastructure security in the cloud
Module 03: Cloud Applications Security
Module 04: Data security in the cloud
Module 05: Cloud Security Operations
Module 06: Cloud Intrusion Tests
Module 07: Response to Cloud Incidents
Module 08: Judicial investigation in the cloud
Module 09: Business continuity and disaster recovery in the cloud
Module 10: Governance, Risk Management and Compliance (RCMP) in the Cloud
Module 11: Cloud Standards, Policy and Legal Issues

Who should attend
  • Network Security Engineers
  • Cybersecurity Analysts
  • Network Security Analysts
  • Cloud administrators and engineers
  • Network Security Administrators
  • Cloud Analysts
  • Cyber security engineers
  • People working in network and cloud management and operations
Objectives of the Course

After taking this course on cloud security, students will have knowledge about:

Generic Cloud Security Knowledge, Skills and Capabilities:
  • Understanding the fundamentals of cloud computing and its architecture.
  • Understand key concepts and components of cloud security.
  • Identify and evaluate the different types of cloud deployment models (public, private, hybrid) and their associated security considerations.
  • Demonstrate knowledge about cloud service models (Infrastructure as a Service, Platform as a Service, Software as a Service) and their respective security challenges.
  • Identify current vulnerabilities and threats specific to cloud environments and develop strategies for their prevention and mitigation.
  • Get to know the challenges and threats of cloud security.
  • To acquire knowledge on IAM in cloud environments.
  • Learn authentication and authorization mechanisms for cloud services.
  • Understand the principles of secure data storage and cloud encryption.
  • To acquire knowledge on network security in cloud environments, including virtual private networks (VPNs) and firewalls.
  • Learn to monitor and record security in the cloud.
  • Understand incident response and disaster recovery strategies for cloud-based systems.
  • Acquiring knowledge on compliance and regulatory considerations in cloud security.
  • Apply best practices to secure cloud-based infrastructure and services.
  • Implement encryption techniques to protect sensitive information in the cloud.
  • Apply access and IAM control principles in cloud environments.
  • Understand and use security monitoring and incident response mechanisms in the cloud.
  • Evaluate and select appropriate cloud service providers based on their security offerings.
  • Understand regulatory and compliance requirements related to cloud security.
  • Create and implement cloud security policies and procedures within an organization.
  • Perform penetration tests, security audits and assessments to ensure compliance with cloud security standards.
  • Understand the shared responsibility model and the division of security responsibilities between cloud providers and customers.
  • Demonstrate knowledge about cloud security frameworks, such as the Cloud Security Alliance.
 
AWS Cloud Security Knowledge, Skills and Capabilities
  • Understand the shared responsibility model in AWS and the division of security responsibilities between AWS and the client.
  • Understand the framework for adopting the AWS cloud and its security capabilities.
  • To gain knowledge of the fundamental concepts of cloud security and best practices in AWS.
  • Learn how to secure AWS identity and access management, including user accounts, groups and roles.
  • Implement secure access control mechanisms, including AMI roles, policies and authorizations.
  • Learn how to set up and secure the network components of the AWS, such as Virtual Private Cloud (VPC), sub-networks and security groups.
  • Understand the various encryption mechanisms available in AWS, including data encryption at rest and in transit.
  • To acquire knowledge about the AWS Key Management Service (KMS) and how to manage and secure cryptographic keys.
  • Learn how to secure AWS computing resources, such as EC2 instances and serverless functions.
  • Develop an understanding of the monitoring and logging services of AWS, including AWS CloudTrail and Amazon CloudWatch, and how to use them for security analysis and incident response.
  • To gain knowledge of the security services and features of AWS, such as AWS WAF (Web Application Firewall), AWS Shield and AWS Inspector, and how to implement them to improve security.
  • Understand best practices to secure AWS storage services such as Amazon S3 (Simple Storage Service) and Amazon EBS (Elastic Block Store).
  • Learn about AWS's security compliance programs and frameworks, such as the AWS Well-Architected framework, and how to implement security controls to meet compliance requirements.
  • To gain knowledge of the automation and security orchestration tools of AWS, such as AWS CloudTraining and AWS Config, and how to use them to automate security deployments and apply security standards.
  • Learn about incident response and disaster recovery in the AWS environment, including best practices for incident management and data backup and recovery.
  • Gain practical experience in configuration and management of security controls in Amazon Web Services.
Azure Cloud Security Knowledge, Skills and Capabilities
  • To gain knowledge of the basic principles, concepts and components of cloud security in the Azure environment.
  • Understand the shared responsibility model and how it applies to securing Azure resources.
  • Understand Microsoft's cloud adoption framework for Azure and achieve cloud adoption goals.
  • Learn how to implement security measures to protect Azure resources such as virtual machines, databases, storage accounts and network components.
  • Learn how to manage user identities, roles and access controls in Azure, including implementation of Azure Active Directory (AAD), role-based access control (RBAC) and multifactor authentication (MFA).
  • Learn about the Azure Virtual Network (VNet) and how to implement network security groups (NSGs), virtual network termination points and private termination points to secure network traffic in Azure using Azure Firewall and Azure DDoS Protection.
  • Understand how to protect data at rest and in transit using Azure features such as Azure disk encryption, Azure storage service encryption, Azure Key Vault and Azure Information Protection, and implement Azure Key Vault to manage and protect cryptographic keys, secrets and certificates.
  • Learn how to enhance the security of Azure AD by implementing features such as Multifactor Authentication (MFA), conditional access, PIM management and Azure AD identity protection.
  • Explore Microsoft Defender for Cloud and learn how to use it to monitor, evaluate and improve the security posture of Azure resources, including virtual machines, containers and Azure services, as well as implement recommendations and best security practices.
  • Acquiring knowledge about Azure Monitor, Azure Sentinel and Microsoft Defender for Cloud threat intelligence capabilities to effectively detect and respond to security incidents.
  • Understanding Azure governance frameworks and best practices to maintain compliance and meet regulatory requirements, including Azure Policy, Azure Blueprints and Azure safety and audit journals.
  • Learn how to secure Azure virtual machines, including the implementation of Azure Bastion for secure remote access and the use of Microsoft Defender for Cloud for virtual machine monitoring and threat detection.
  • To acquire knowledge on best practices to secure Azure resources and implement security controls.
  • Learn about incident response procedures, disaster recovery planning and the use of Azure services such as Azure Site Recovery and Azure Backup for data protection and business continuity.
  • Learn about other security services and solutions in Azure, such as Azure DDoS Protection and Azure Advanced Threat Protection.
  • Explore best practices to secure Azure, Azure App Service and Azure SQL Database storage accounts.
  • Understand Azure Backup and Azure Site Recovery for data protection and disaster recovery scenarios.
  • Gain practical experience in configuration and management of security controls in Microsoft Azure.
GCP-specific concepts
  • Acquire a strong understanding of key concepts, principles and best practices related to secure applications and data in the GCP environment.
  • Understand the fundamentals of cloud security and the shared responsibility model in GCP.
  • Understand the adoption framework of Google Cloud.
  • Know GCP security concepts, tools and services to protect cloud-based resources.
  • Learn how to implement and configure IAM roles, policies and permissions to control access to GCP resources, services and data.
  • Understand how to design and configure secure virtual networks (VPCs) in GCP, including network segmentation, firewall rules, subnets and VPC peering.
  • Learn about GCP network security features and tools, such as Cloud Armor, Cloud Load Balancing, Cloud VPN and Cloud DNS, to protect network traffic and prevent unauthorized access.
  • Understand how to effectively protect sensitive data in GCP using encryption techniques, including rest and transit encryption, key management and Google Cloud Key Management Service (KMS).
  • Learn how to configure logging and monitoring mechanisms in GCP to effectively detect and respond to security incidents, using tools such as Google Cloud Security Command Center and Operations Suite Logging.
  • Understand best practices for the secure development of GCP applications, including secure coding techniques, vulnerability management and integration with GCP security services such as Cloud Security Scanner and Cloud Security Command Center.
  • Become familiar with GCP's compliance frameworks, certifications and regulatory requirements, and learn how to implement safety controls and practices to meet industry standards and compliance obligations.
  • Develop skills in incident response planning, security incident management and disaster recovery techniques specific to GCP, including detection, containment and remediation procedures.
  • Understand recommended security practices and configurations for different GCP services and resources, including Compute Engine, Cloud Storage, SQL Cloud and Google Kubernetes Engine (GKE).
  • Learn how to leverage additional GCP services such as Cloud Identity-Aware Proxy (IAP), Security Key Enforcement and Identity Platform to improve authentication and access control.
  • Gain practical experience in setting up and managing security controls on Google Cloud Platform.
Success Score

To maintain the high integrity of our certification exams, EC-Council exams are offered in several forms (i.e. different question banks). Each form is carefully analyzed through beta tests with an appropriate sample under the supervision of a committee of experts who ensure that each of our exams has not only academic rigour but also applicability in the "real world". We also have a process to determine the level of difficulty of each issue. The individual score then contributes to a global "Cut Score" for each form of examination. To ensure that each form has fair standards of assessment, cutting scores are set on a "by examination form" basis. Depending on the contested form of examination, cutting scores may range from 60% to 78%.

  • Prefix to Review: 312-40 (ECC EXAM)
  • Number of Questions: 125
  • Duration of the Review: 4 Hours
  • Review Format: Multiple Choice Questions
  • Transition Mode: EC-Council Examination Portal
Professional roles
  • Cloud Security Engineer
  • Cloud Security Consultant
  • Head of Cyber Cloud Security
  • Cloud Security Architect
  • Cloud Security Manager
  • Security Engineer Cloud API
  • Cloud Security Technical Manager
  • Cloud Security Administrator
  • Cloud Security Analyst
  • Cloud Security Specialist
  • Head of IT Delivery
  • Cloud Security Engineer

 

  • Specialist in Security and Cloud Compliance
  • Head of Cloud Security Operations
  • Head of Cloud Security Practice
  • Cloud Security Engineer – DevSecOps
  • DevSecOps Cloud Security Architect
  • Cloud/OPS Security
  • Cloud Security Expert
  • Project Leader in Cloud Security
  • Security Engineer/ Cloud Operations
  • Cloud Security Engineer/Infosec/SecOps
  • DevOps Cloud Engineer
Save big. Join the club.

If you are outside North America and are interested in the club membership, please click Here.

This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0