跳至产品信息
1 / 1

ECC

CCSE | Certified Cloud Security Engineer | Exam Insurance | Self-Pace Video Course+ CyberQ Lab + eCourseware + Practice Test & Exam Voucher

CCSE | Certified Cloud Security Engineer | Exam Insurance | Self-Pace Video Course+ CyberQ Lab + eCourseware + Practice Test & Exam Voucher

常规价格 $1,499.00 USD
常规价格 $1,999.00 USD 促销价 $1,499.00 USD
促销 售罄
结账时计算的运费

EC-Council CCSE | Certified Cloud Security Engineer |  Exam Insurance | Self-Pace Video Course (12 months) + CyberQ Lab (6 monts) + eCourseware (24 months) + Practice Test & Exam Voucher

Our course offers a unique Confidence Insurance program with one free retake, ensuring students can study and pursue their international certification with complete peace of mind.

Note: The 24/7 live support via chat group and answering questions or providing additional practical guidance through video (in addition to the theoretical lessons and practical instructions from the official ECCouncil instructor).

Certified Cloud Security Engineer | CCSE

Certified Cloud Security Engineer (CCSE) is a hands-on course designed and developed by cloud security professionals in association with subject matter experts across the globe. This course includes both vendor neutral and vendor specific cloud security concepts. Vendor neutral concepts include universally applicable general cloud security best practices, technology, frameworks, and principles that help individuals to strengthen their fundamentals. It helps professionals to develop and enhance their knowledge and skills in planning, configuring, implementing, and maintaining a secure cloud environment for their organizations, and validates their knowledge, skills, and abilities in protecting, detecting, and responding to threats in the cloud network infrastructure.

 

Course Outline

 

  • Module 01: Introduction to Cloud Security
  • Module 02: Cloud Platform and Infrastructure Security in Cloud
  • Module 03: Application Security in Cloud
  • Module 04: Data Security in Cloud
  • Module 05: Security Operations in Cloud
  • Module 06: Cloud Penetration Testing in Cloud

           Module 07: Incident Response in Cloud

  • Module 08: Forensic Investigation in Cloud
  • Module 09: Business Continuity and Disaster Recovery in Cloud
  • Module 10: Governance, Risk Management, and Compliance (GRC) in Cloud
  • Module 11: Standards, Policies, and Legal Issues in Cloud

Who Should Attend

 

  • Network security engineers
  • Cybersecurity analysts
  • Network security analysts
  •  Cloud administrators and engineers
  • Network security administrators
  • Cloud analysts
  • Cybersecurity engineers
  • Those working in network and cloud management and operations

Course Objectives

After attending this cloud security course, students will have knowledge on the following:



Generic cloud security knowledge, skills, and abilities

 

  • Understand the fundamentals of cloud computing and its architecture.
  • Comprehend the key concepts and components of cloud security.
  • Identify and evaluate the different types of cloud deployment models (public, private, hybrid) and their associated security considerations.
    VDemonstrate knowledge of cloud service models (Infrastructure as a Service, Platform as a Service, Software as a Service) and their respective security challenges.
  • Identify common vulnerabilities and threats specific to cloud environments and develop strategies for their prevention and mitigation.
  • Familiarize yourself with cloud security challenges and threats.
  • Acquire knowledge of identity and access management (IAM) in cloud environments.
  • Learn about authentication and authorization mechanisms for cloud services.
  • Understand the principles of secure data storage and encryption in the cloud.
  • Gain knowledge of network security in cloud environments, including virtual private networks (VPNs) and firewalls.
  • Learn about security monitoring and logging in the cloud.
  • Understand incident response and disaster recovery strategies for cloud-based systems.
  • Acquire knowledge of compliance and regulatory considerations in cloud security.
  • Apply best practices for securing cloud-based infrastructure and services.
  • Implement encryption techniques to safeguard sensitive information in the cloud.
  • Apply principles of access control and IAM in the context of cloud environments.
  • Understand and utilize security monitoring and incident response mechanisms in the cloud.
  • Evaluate and select appropriate cloud service providers based on their security offerings.
  • Comprehend regulatory and compliance requirements related to cloud security.
  • Create and enforce cloud security policies and procedures within an organization.
  • Conduct penetration test, security audits, and assessments to ensure compliance with cloud security standards.
  • Understand the shared responsibility model and the division of security responsibilities between cloud providers and customers.
  • Demonstrate knowledge of cloud security frameworks, such as CSA (Cloud Security Alliance
AWS Cloud Security knowledge, skills, and abilities

 

  • Understand the shared responsibility model in AWS and the division of security responsibilities between AWS and the customer.
  • Understand AWS Cloud Adoption Framework and its security perspective Capabilities.
  • Gain knowledge of fundamental cloud security concepts and best practices in AWS.
  • Learn how to secure AWS identities and access management, including user accounts, groups, and roles.
  • Implement secure access control mechanisms, including IAM roles, policies, and permissions.
  • Learn how to configure and secure AWS networking components such as Virtual Private Cloud (VPC), subnets, and security groups.
  • Understand the various encryption mechanisms available in AWS, including data-at-rest and data-in-transit encryption.
  • Gain knowledge of AWS Key Management Service (KMS) and how to manage and secure cryptographic keys.
  • Learn how to secure AWS compute resources, such as EC2 instances and serverless functions.
  • Develop an understanding of AWS monitoring and logging services, including AWS CloudTrail and Amazon CloudWatch, and how to leverage them for security analysis and incident response.
  • Gain knowledge of AWS security services and features, such as AWS WAF (Web Application Firewall), AWS Shield, and AWS Inspector, and how to implement them to enhance security.
  • Understand best practices for securing AWS storage services, such as Amazon S3 (Simple Storage Service) and Amazon EBS (Elastic Block Store).
  • Learn about AWS security compliance programs and frameworks, such as AWS Well-Architected Framework, and how to implement security controls to meet compliance requirements.
  • Gain knowledge of AWS security automation and orchestration tools, such as AWS CloudFormation and AWS Config, and how to use them to automate security deployments and enforce security standards.
  • Learn about incident response and disaster recovery in the AWS environment, including best practices for incident handling and data backup and recovery.
  • Gain practical experience in configuring and managing security controls in Amazon Web Services

 

Azure Cloud Security knowledge, skills, and abilities

 

  • Gain knowledge of the basic principles, concepts, and components of cloud security in the Azure environment.
  • Understand the shared responsibility model and how it applies to securing Azure resources.
  • Understand Microsoft Cloud Adoption Framework for Azure and achieve cloud adoption goals.
  • Learn how to implement security measures to protect Azure resources such as virtual machines, databases, storage accounts, and networking components.
  • Learn how to manage user identities, roles, and access controls in Azure, including implementing Azure Active Directory (AAD), role-based access control (RBAC), and multi-factor authentication (MFA)
  • Learn about Azure Virtual Network (VNet) and how to implement network security groups (NSGs), virtual network service endpoints, and private endpoints to secure network traffic within Azure using Azure Firewall, and Azure DDoS Protection.
  • Understand how to protect data at rest and in transit using Azure features like Azure Disk Encryption, Azure Storage Service Encryption, Azure Key Vault, and Azure Information Protection and Implement Azure Key Vault to manage and safeguard cryptographic keys, secrets, and certificates.
  • Learn how to enhance Azure AD security by implementing features like multifactor authentication (MFA), conditional access, Privileged Identity Management (PIM), and Azure AD Identity Protection.
  • Explore Microsoft Defender for cloud and learn how to use it to monitor, assess, and improve the security posture of Azure resources, including virtual machines, containers, and Azure services as well as implementing security recommendations and best practices.
  • Gain knowledge of Azure Monitor, Azure Sentinel, and Microsoft Defender for cloud’s threat intelligence capabilities to detect and respond to security incidents effectively.
  • Understand Azure governance frameworks and best practices for maintaining compliance and meeting regulatory requirements, including Azure Policy, Azure Blueprints, and Azure Audit and Security Logs.
  • Learn how to secure Azure virtual machines including, implementing Azure Bastion for secure remote access and using Microsoft Defender for cloud for VM monitoring and threat detection.
  • Acquire knowledge of best practices for securing Azure resources and implementing security controls.
  • Learn about incident response procedures, disaster recovery planning, and utilizing Azure services such as Azure Site Recovery and Azure Backup for data protection and business continuity.
  • Gain knowledge of additional security services and solutions in Azure, such as Azure DDoS Protection, and Azure Advanced Threat Protection.
    Explore best practices for securing Azure Storage accounts, Azure App Service, and Azure SQL Database.
  • Understand Azure Backup and Azure Site Recovery for data protection and disaster recovery scenarios.
  • Gain practical experience in configuring and managing security controls in Microsoft Azure

 

GCP Specific Concepts

 

  • Gain a solid understanding of the key concepts, principles, and best practices related to securing applications and data in the GCP environment.
  • Understanding the fundamentals of cloud security and the shared responsibility model in GCP.
  • Understand Google Cloud Adoption Framework.
  • Knowledge of GCP security concepts, tools, and services for protecting cloud-based resources.
  • Learn how to implement and configure IAM roles, policies, and permissions to control access to GCP resources, services, and data.
  • Understand how to design and configure secure virtual networks (VPCs) in GCP, including network segmentation, firewall rules, subnetworks, and VPC peering.
  • Learn about GCP’s network security features and tools, such as Cloud Armor, Cloud Load Balancing, Cloud VPN, and Cloud DNS, to protect network traffic and prevent unauthorized access.
  • Understand how to effectively protect sensitive data in GCP using encryption techniques, including encryption at rest and in transit, key management, and Google Cloud Key Management Service (KMS).
  • Learn how to set up and configure logging and monitoring mechanisms in GCP to detect and respond to security incidents effectively. This may involve using tools like Google Cloud Security Command Center and Operations Suite Logging.
  • Understand best practices for secure application development on GCP, including secure coding techniques, vulnerability management, and integration with GCP security services like Cloud Security Scanner and Cloud Security Command Center.
  • Familiarize yourself with GCP’s compliance frameworks, certifications, and regulatory requirements, and learn how to implement security controls and practices to meet industry standards and compliance obligations.
  • Develop skills in incident response planning, security incident management, and disaster recovery techniques specific to GCP, including incident detection, containment, and remediation procedures.
  • Understand the recommended security practices and configurations for different GCP services and resources, including Compute Engine, Cloud Storage, Cloud SQL, and Google Kubernetes Engine (GKE)
  • Learn how to leverage additional GCP services like Cloud Identity-Aware Proxy (IAP), Security Key Enforcement, and Identity Platform to enhance authentication and access control.
  • Gain practical experience in configuring and managing security controls in Google Cloud Platform

 

查看完整详细信息

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)