Master Cloud Security Skills Across AWS, Azure and Google Cloud
The Certified Cloud Security Engineer (C|CSE) by EC-Council is a multi-cloud security certification program crafted by industry experts. It offers a holistic understanding of cloud security and empowers cybersecurity professionals to apply practical skills to build, operate, and defend their environments regardless of the selected infrastructure.
Our unique approach to designing curriculum allows C|CSE content to match the latest security tools and techniques for the AWS, Azure, and GCP platforms, as well as private and hybrid architectures.
This design makes the C|CSE program a perfect blend of vendor-neutral training topics with vendor specific instruction and performance labs, offering cybersecurity professionals an unbiased learning experience.
C|CSE offers a hands-on practical approach, featuring over 85 labs to ensure candidates gain hands on experience that can be immediately applied at the workplace to anticipate and overcome cloud security challenges.
What students Learn in C|CSE
Generic Cloud Security Concepts
• Fundamentals of cloud computing and its architecture
• Key concepts and components of cloud security
• Cloud deployment models (public, private, hybrid) and their associated security considerations
• Cloud service models (Infrastructure as a Service, Platform as a Service, Software as a Service) and their respective security challenges
• Common vulnerabilities and threats specific to cloud environments and strategies for their prevention and mitigation
• Cloud security challenges and threats
• Identity and access management (IAM) in cloud environments
• Authentication and authorization mechanisms for cloud services
• Principles of secure data storage and encryption in the cloud
• Network security in cloud environments, including virtual private networks (VPNs) and firewalls
• Security monitoring and logging in to the cloud
• Incident response and disaster recovery strategies for cloud-based systems
• Best practices for securing cloud-based infrastructure and services
• Encryption techniques to safeguard sensitive information in the cloud
• Access control and IAM in the context of cloud environments
• Utilizing security monitoring and incident response mechanisms in the cloud
• Evaluate appropriate cloud service providers based on their security offerings
• Regulatory and compliance requirements related to cloud security
• Cloud security policies and procedures
• Penetration tests, security audits, and assessments to ensure compliance with cloud security standards
• Shared responsibility model and the division of security responsibilities between cloud providers and customers
• Knowledge of cloud security frameworks, such as CSA (Cloud Security Alliance)
AWS Specific Security Concepts:
• AWS’s shared responsibility model and the security responsibilities division between AWS and the customer
• AWS Cloud Adoption Framework and its security perspective capabilities
• Fundamental cloud security concepts and best practices in AWS
• Secure AWS identities and access management, including user accounts, groups, and roles
• Access control mechanisms, including IAM roles, policies, and permissions
• Configure and secure AWS networking components such as Virtual Private Cloud (VPC), subnets, and security groups
• Encryption mechanisms available in AWS, including data-at-rest and data-in-transit encryption
• AWS Key Management Service (KMS) and cryptographic keys
• AWS compute resources, such as EC2 instances and serverless functions
• AWS monitoring and logging services, including AWS CloudTrail and Amazon CloudWatch, for security analysis and incident response
• AWS security services and features such as AWS WAF (Web Application Firewall), AWS Shield, and AWS Inspector, as well as how to implement them to enhance security
• Best practices for securing AWS storage services, such as Amazon S3 (Simple Storage Service) and Amazon EBS (Elastic Block Store)
• AWS security compliance programs and frameworks, such as the AWS Well-Architected Framework, to implement security controls to meet compliance requirements
• AWS security automation and orchestration tools, such as AWS CloudFormation and AWS Config,
to automate security deployments and enforce security standards
• Incident response and disaster recovery in the AWS environment, including best practices for incident handling and data backup and recovery
Azure Specific Security Concepts:
• Principles, concepts, and components of cloud security
• Shared responsibility model and its application
• Microsoft Cloud Adoption Framework for Azure to achieve cloud adoption goals
• Security measures to protect Azure resources such as virtual machines, databases, storage accounts, and networking components
• User identities, roles, and access controls management in Azure, including implementing Azure Active Directory (AAD), role-based access control (RBAC), and multi-factor authentication (MFA)
• Azure Virtual Network (VNet) and implementation of network security groups (NSGs), virtual network service endpoints, and private endpoints to secure network traffic within Azure using Azure Firewall and Azure DDoS Protection
• Protect data at rest and in transit using Azure features like Azure Disk Encryption, Azure Storage Service Encryption, Azure Key Vault, and Azure Information Protection
• Implement Azure Key Vault to manage and safeguard cryptographic keys, secrets, and certificates
• Azure AD security enhancement through the implementation of features like multi-factor authentication (MFA), conditional access, Privileged Identity Management (PIM), and Azure AD Identity Protection
• Microsoft Defender for the cloud to monitor, assess, and improve the security posture of Azure resources, including virtual machines, containers, and Azure services, and implement security recommendations and best practices
• Azure Monitor, Azure Sentinel, and Microsoft Defender for the cloud’s threat intelligence capabilities to detect and respond to security incidents effectively
• Azure governance frameworks and best practices for maintaining compliance and meeting regulatory requirements, including Azure Policy, Azure Blueprints, and Azure Audit and Security Logs
• Secure Azure virtual machines, including implementing Azure Bastion for secure remote access and using Microsoft Defender for cloud for VM monitoring and threat detection
• Best practices for securing Azure resources and implementing security controls
• Incident response procedures, disaster recovery planning, and utilizing Azure services such as Azure Site Recovery and Azure Backup
• Additional security services and solutions in Azure, including Azure DDoS Protection and Azure Advanced Threat Protection
• Best practices for securing Azure Storage accounts, Azure App Service, and Azure SQL Database
• Azure Backup and Azure Site Recovery for data protection and disaster recovery scenarios
Google Cloud Specific Security Concepts:
• Key concepts, principles, and best practices for securing applications and data
• Fundamentals of cloud security and shared responsibility
• Google Cloud Adoption Framework
• GCP security concepts, tools, and services for protecting cloud-based resources
• Implement and configure IAM roles, policies, and permissions to control access to GCP resources, services, and data
• Design and configure secure virtual networks (VPCs) in GCP, including network segmentation, firewall rules, subnetworks, and VPC peering
• GCP’s network security features and tools, such as Cloud Armor, Cloud Load Balancing, Cloud VPN, and Cloud DNS to protect network traffic and prevent unauthorized access
• Protect sensitive data in GCP using encryption techniques, including encryption at rest and in transit, key management, and Google Cloud Key Management Service (KMS)
• Set up and configure logging and monitoring mechanisms to detect and respond to security incidents using tools like the Google Cloud Security Command Center and Operations Suite Logging
• Best practices for secure application development on GCP, including secure coding techniques, vulnerability management, and integration with security services like Cloud Security Scanner and Cloud Security Command Center
• GCP’s compliance frameworks, certifications, and regulatory requirements to implement security controls and practices to meet industry standards and compliance obligations
• Incident response planning, security incident management, and disaster recovery techniquesspecific to GCP, including incident detection, containment, and remediation procedures
• Recommended security practices and configurations for different GCP services and resources, including Compute Engine, Cloud Storage, Cloud SQL, and Google Kubernetes Engine (GKE)
• Additional GCP services like Cloud Identity-Aware Proxy (IAP), Security Key Enforcement, and Identity Platform to enhance authentication and access control
Top tools Covered in the Certified Cloud Security Engineer (C|CSE)
• AWS IAM
• AWS KMS
• AWS VPC
• Web Application Firewall Cloud Front
• Amazon RDS
• Amazon Backup
• Amazon Inspector
• AWS Cloud Trial
• CloudWatch
• Amazon Macie
• AWS Security Hub
• AWS Trusted Advisor
• Microsoft Defender for Cloud
• Azure Active Directory
• Azure Monitor
• Network Watcher
• Azure Storage Analytics
• Azure Policy
• ScoutSuite
• Azure Blueprints
• Cloud Security Suite
• PowerZure
• App Engine Firewall
• Cloud Identity
• Cloud Monitoring
• Security Command Center
• Web Application and API protection
• Google Cloud Armor
• Cloud Security Scanner
• GCP-IAM-Privilege-Escalation
• Secrets Manager
• Chronicle Detect
• Cloud Key Management
Vendor-Specific Labs:
AWS – 38 labs
Azure -19 Labs
Google Clouds – 31 Labs
Course Outline
MODULE 01 : Introduction to Cloud Security
This module provides a basic understanding of cloud computing and its service models, including the various threats and vulnerabilities found in the cloud. It highlights various factors for evaluating service providers and understanding the shared security responsibility model of service providers. Understanding the shared responsibility model provided by the cloud service provider is essential to configuring the cloud environment securely and protecting organizational resources.
MODULE 02 : Platform and Infrastructure Security in the Cloud
This module explains the key components and technology that make the architecture of the cloud and the various techniques involved in securing the multi-tenancy, virtualized, physical, and logical cloud components. It demonstrates the configurations to secure the physical data center. Users can learn the best practices to secure the workload, computing resources, and networks in the cloud. This module demonstrates the use of various services and tools provided for network and computing security in Azure, AWS, and Google cloud.
MODULE 03 : Application Security in the Cloud
This module focuses on securing cloud applications, from designing to deployment of an application in the cloud. It explains the changes in the Secure Software Development Life Cycle (SSDLC) in the cloud. It shows how service providers’ identity and access management features help implement authentication and authorization and restrict unauthorized users from accessing cloud resources.
It teaches the implementation of security controls throughout the software development life cycle.
This module highlights integrating security into DevOps and the continuous integration/continuous deployment (CI/CD) model for developing and deploying cloud applications. This module demonstrates the use of various services and tools provided for application security in Azure, AWS, and Google Cloud.
MODULE 04 : Data Security in the Cloud
Data security is the major concern while migrating to the cloud. This module covers the basics of cloud data storage, its life cycle, and various controls to protect data-in-rest and data-in-transit in the cloud. This module includes data storage features and various services and tools for securing the data stored in Azure, AWS, and Google Cloud.
MODULE 05 : Operation Security in the Cloud
This module includes the security controls for building, implementing, operating, managing, and maintaining physical and logical infrastructure for cloud environments. It covers the services, features, and tools AWS, Azure, and Google Cloud provide for operational security.
MODULE 06 : Penetration Testing in the Cloud
This module demonstrates how to implement a comprehensive penetration testing methodology for assessing the security of an organization’s cloud infrastructure. It demonstrates the various services and tools used to perform penetration testing in AWS, Azure, and Google Cloud.
MODULE 07 : Incident Detection and Response in the Cloud
An incident response (IR) plan is crucial to prevent security breaches in the cloud. This module describes the incident response life cycle and highlights the considerations for responders in each phase of the IR plan in a cloud environment. It highlights the use of SOAR in automating incident response in the cloud. This module explores the incident response capabilities provided by AWS, Azure, and Google Cloud. It demonstrates various tools and services for incident detection and response.
MODULE 08 : Forensics Investigation in the Cloud
Access to forensic data and the forensic investigation process in a cloud computing environment differ from the network forensic investigation process. This module highlights various cloud forensic challenges and data collection methodologies. It demonstrates how to investigate security incidents in the cloud using various tools provided by AWS, Azure, and Google Cloud.
MODULE 09 : Business Continuity and Disaster Recovery in the Cloud
Business Continuity and Disaster Recovery (BC/DR) is important in the cloud because a third party manages the resources. This module teaches the role of the business continuity and disaster recovery plan in the cloud. It explains backup and recovery tools and the services and features provided by service providers such as AWS, Azure, and Google Cloud to prepare and manage outages to ensure business continuity.
MODULE 10 : Governance, Risk Management, and Compliance in the Cloud
This module highlights the standards, policies, and legal issues related to the cloud. It highlights various legal and compliance issues found in a cloud environment. It discusses various cloud security standards and audit planning in the cloud. It demonstrates the features, services, and tools for compliance and auditing in Azure, AWS, and Google Cloud.
MODULE 11 : Standards, Policies, and Legal Issues in the Cloud
This module highlights the standards, policies, and legal issues related to the cloud. It highlights various legal and compliance issues found in a cloud environment. It discusses various cloud security standards and audit planning in the cloud. It demonstrates the features, services, and tools for compliance and auditing in Azure, AWS, and Google Cloud.