Exclusives

  • Certification exam participation: Voucher included – value of $750!
  • Video recording: 365 days of access to your course for viewing
  • Technical lab: Available for 180 days of online access
  • Class material: Complete and up to date with ASPEN
  • CodeRed: Subscription to the platform included for 365 days
  • Proof of attendance: Digital certificate of completion for the official EC-Council course
  • Fast and guaranteed private class delivery: Maximum wait of 4 to 6 weeks after registration, guaranteed date

The EC-Council Certified Cloud Security Engineer (CCSE) course is organized by cloud security professionals in association with renowned experts to offer a blend of both vendor-neutral and vendor-specific cloud security concepts.

Vendor-neutral concepts focus on cloud security practices, technologies, frameworks, and principles. In contrast, vendor-specific materials provide the practical skills necessary to configure specific platforms such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP). This offers candidates a well-balanced mix of theoretical and practical skills. Additionally, advanced topics also cover modules on securing cloud infrastructure by implementing regulations and standards to maintain security. The EC-Council cloud security course is tailored to the real-time roles and responsibilities of cloud security professionals and is ideal for both beginners and experienced cybersecurity professionals.

Expand

Public class

Planned date
November 11, 2024
4495
English
Planned date
December 16, 2024
4495
English
Planned date
January 27, 2025
4495
English
Planned date
March 10, 2025
4495
English

Private class

Inquire for this training to be delivered exclusively for the members of your organization.

Training plan

In this module, you will be presented with the core concepts of cloud computing, cloud service models, and cloud-based threats and vulnerabilities. The module highlights service provider components, such as evaluation and the shared security responsibility model, that are essential to configuring a secure cloud environment and protecting organizational resources

This module explores the key components and technologies that form a cloud architecture and how to secure multi-tenant, virtualized, physical, and logical cloud components. This module demonstrates configurations and best practices for securing physical data centers and cloud infrastructures using the tools and techniques provided by Azure, AWS, and GCP.

The focus of this module is securing cloud applications and explaining secure software development lifecycle changes. It explains the multiple services and tools for application security in Azure, AWS, and GCP.

This module covers the basics of cloud data storage, its lifecycle, and various controls for protecting data at rest and data in transit in the cloud. It also addresses data storage features and the multiple servicesand tools used for securing data stored in Azure, AWS, and GCP.

This module encompasses the security controls essential to building, implementing, operating, managing, and maintaining physical and logical infrastructures for cloud environments and the required services, features, and tools for operational security provided by AWS, Azure, and GCP.

This module demonstrates how to implement comprehensive penetration testing to assess the security of an organization’s cloud infrastructure and reviews the required services and tools used to perform penetration testing in AWS, Azure, and GCP.

This module focuses on incident response (IR). It covers the IR lifecycle and the tools and techniques used to identify and respond to incidents; provides training on using SOAR technologies; and explores the IR capabilities provided by AWS, Azure, and GCP.

This module covers the forensic investigation process in cloud computing, including various cloud forensic challenges and data collection methods. It also explains how to investigate security incidents using AWS, Azure, and GCP tools.

This module highlights the importance of business continuity and disaster recovery planning in IR. It covers the backup and recovery tools, services, and features provided by AWS, Azure, and GCP to monitor business continuity issues.

This module focuses on the various governance frameworks, models, and regulations (ISO/IEC 27017, HIPAA, and PCI DSS) and the design and implementation of governance frameworks in the cloud. It also addresses cloud compliance frameworks and elaborates on the AWS, Azure, and GCP governance modules.

This module discusses standards, policies, and legal issues associated with the cloud. It also covers the features, services, and tools needed for compliance and auditing in AWS, Azure, and GCP.

Recommended Prerequisite Knowledge

  • Basic Knowledge: Participants should have a fundamental understanding of cybersecurity concepts and basic networking principles.
  • Prior Training: It is often recommended to have completed foundational courses such as Certified Ethical Hacker (CEH) or have equivalent knowledge.
  • Experience: Practical experience in cybersecurity, IT, or related fields is beneficial, though not always mandatory.
  • Technical Skills: Familiarity with various operating systems, particularly Windows and Linux, as well as basic scripting knowledge can be advantageous.
  • Interest in Cybersecurity: A strong interest and enthusiasm for learning advanced techniques and practices in cybersecurity.

Credentials and certification

Exam features

  • Code: 312-40
  • Title: Certified Cloud Security Engineer 
  • Duration: 4 hours  
  • Number of Questions: 125  
  • Question Format: Multiple Choice
  • Online with EC-Council Exam Center
  • Cost: $0 (included in your training)

All details >>

Request form for a private class training

Dear Client,

We confirm the receipt of your request regarding the training: Certified Cloud Security Engineer (CCSE) (EC6163)

Here is the information we have received.

Language: English

Duration: 5 days / 35 hours

Number of participants from your company: *

Minimum number of participants: 6

Name of your organization *
Your name and surname: *
Phone Number: *
Professional email: *
How did you hear about us? *
Comments or Remarks:
Promotional code:
I accept the General Terms and Conditions
The General Conditions are accessible on this page.

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.