Certified Cloud Security Engineer (CCSE)

Seminarinformationen

Seminar - Ziel

Cloud technology has transformed the technology landscape and will continue to do so for years to come. EC-Council’s Certified Cloud Security Engineer (CCSE) is a vendor-neutral course that focuses on cloud security practices, technologies, frameworks, and principles to deliver a well-balanced mix of the theoretical and practical skills you need to become a cloud security expert.

CCSE was created with cloud security job roles in mind and is designed to help you meet the challenges of tomorrow. As cloud technology evolves, you should too – come learn the skills you need now to defend the technology of tomorrow.

Teilnehmer - Zielgruppe

  • Network security engineers
  • Cybersecurity analysts
  • Network security analysts
  • Cloud administrators and engineers
  • Network security administrators
  • Cloud analysts
  • Cybersecurity engineers
  • Those working in network and cloud management and operations

Kurs - Voraussetzungen

  • Sound knowledge of network security management
  • Basic understanding of cloud computing concepts

Seminardauer

  • 5 Tage
  • 09:00 Uhr bis 17:00 Uhr

Schulungsunterlagen

  • nach Absprache

Seminar-Inhalt / Agenda

Module 01 Introduction to Cloud Security

  • LO#01: Understand Cloud Computing Fundamentals
  • LO#02: Understand Cloud Security Objectives and Issues
  • LO#03: Understanding Cloud Security Insights
  • LO#04: Evaluate CSPs for Security before Consuming a Cloud Service
  • LO#05: Discuss Security Shared Responsibility Model in Amazon Cloud (AWS)
  • LO#06: Discuss Security Shared Responsibility Model in Microsoft Azure Cloud
  • LO#07: Discuss Security Shared Responsibility Model in Google Cloud Platform (GCP)

Module 02: Platform and Infrastructure Security in Cloud

  • LO#01: Understand Cloud Platform and Infrastructure
  • LO#02: Understand the Risks and Threats Associated with Cloud Platform and Infrastructure
  • LO#03: Learn how to Secure the Key Components of Cloud Platform and Infrastructure
  • LO#04: Learn how to Design a Secure Data Center in Cloud
  • LO#05: Understand Cloud Platform and Infrastructure Security in AWS
  • LO#06: Learn how to Implement Cloud Platform and Infrastructure Security in AWS
  • LO#07: Understand Cloud Platform and Infrastructure Security in GCP
  • LO#08: Learn how to Implement Cloud Platform and Infrastructure Security in Google
  • LO#09: Understand Cloud Platform and Infrastructure Security in Microsoft Azure
  • LO#10: Learn to Implement Cloud Platform and Infrastructure Security in Microsoft Azure

Module 03 Application Security in Cloud

  • LO#01: Understand Cloud Application Security
  • LO#02: Discuss cloud application security risks
  • LO#03: Understand Secure Software Development Lifecycle (SSDLC) of Cloud Applications
  • LO#04: Understand DevOps and Continuous Integration/ Continuous Deployment (CI/CD)
  • LO#05: Discuss cloud application security controls
  • LO#06: Understand Application Security Features in AWS
  • LO#07: Learn How to Implement Application Security in AWS
  • LO#08: Understand Application Security Features in Azure
  • LO#09: Learn How to Implement Application Security in Azure
  • LO#10: Understand Application Security Features in GCP
  • LO#11: Learn How to Implement Application Security in GCP

Module 04 Data Security in Cloud

  • LO#01: Understand Data Security in Cloud
  • LO#02: Discuss cloud data storage fundamentals
  • LO#03: Understand the cloud storage architecture and life cycle phases
  • LO#04: Evaluate the risks, attacks, and issues in cloud data storage
  • LO#05: Understand data security strategies and technologies in the cloud
  • LO# 06: Discuss Information Rights management Systems
  • LO# 07: Discuss Data retention and archiving strategies
  • LO#08: Discuss Storage and Analysis of Data events
  • LO#09: Understand storage services in Amazon Webservices (AWS)
  • LO#10: Learn how to implement data security in Amazon Webservices (AWS)
  • LO#11: Understand storage services in Google Cloud Platform (GCP)
  • LO#12: Learn how to implement data security in Google Cloud Platform (GCP)
  • LO#13: Understand storage services in Microsoft Azure
  • LO#14: Learn how to implement data security in Microsoft Azure

Module 05 Security Operations in Cloud

  • LO#01: Discuss cloud security operations
  • LO#02: Understand elements (standards and methods) in cloud data center physical/logical
  • Operations
  • LO#03: Learn Security Operations to Build Cloud Infrastructure
  • LO#04: Learn How to Perform Security Operations for Cloud Infrastructures
  • LO#05: Learn Security Operations to Manage Cloud Infrastructure
  • LO#06: Discuss Security Configurations Management for Cloud Infrastructure
  • LO#07: Learn to Monitor Security Operations for Cloud Infrastructure
  • LO#08: Understand security operations in Microsoft Azure
  • LO#09: Learn to implement security operations in Microsoft Azure
  • LO#10: Understand security operations in Amazon Webservices (AWS)
  • LO#11: Learn to implement security operations in Amazon Webservices (AWS)
  • LO#12: Understand security operations in Google Cloud Platform (GCP)
  • LO#13: Learn to implement security operations in Google Cloud Platform (GCP)

Module 06: Penetration Testing in Cloud

  • LO#01: Understand the scope of cloud penetration testing
  • LO#02: Learn generic penetration testing steps in the cloud
  • LO#03: Learn AWS-specific penetration testing steps
  • LO#04: Learn Azure-specific penetration testing steps
  • LO#05: Learn GCP-specific penetration testing steps

Module 07: Incident Response in Cloud

  • LO#01: Understand Cloud Incident Response
  • LO#02: Understand Cloud Incident Response Lifecycle
  • LO#03: Understand How SOAR Accelerates Incident Response
  • LO#04: Discuss Security Incident Response in AWS
  • LO#05: Discuss AWS Investigation and Detection Tools
  • LO#06: Discuss Security Incident Response in Microsoft Azure Cloud
  • LO#07: Discuss Security Incident Response in Google Cloud Platform (GCP)

Module 08 Forensic Investigation in Cloud

  • LO#01: Discuss cloud forensics
  • LO#02: Learn how to investigate security incidents in Amazon Web Services (AWS)
  • LO#03: Learn how to investigate security incidents in Microsoft Azure
  • LO#04: Learn how to investigate security incidents in Google Cloud Platform (GCP)

Module 09: Business Continuity and Disaster Recovery in Cloud

  • LO#01: Discuss Cloud Disaster Recovery and Business Continuity
  • LO#02: Learn to Design Disaster Recovery and Business Continuity in Cloud
  • LO#03: Learn to Architect Recovery and Resilience in AWS
  • LO#04: Learn to Implement Recovery and Resilience in AWS
  • LO#05: Understand Business Continuity and Disaster Recovery in Microsoft Azure
  • LO#06: Learn Disaster Recovery Configurations in Azure
  • LO#07: Learn to Implement BC/DR with Azure SQL Database
  • LO#08: Learn to Configure BCDR for Azure Stack Edge VPN
  • LO#09: Understand Various Disaster Recovery Scenarios in Azure
  • LO#10: Learn to Implement BCDR in Azure
  • LO#11: Discuss Azure Partner Solutions for BCDR
  • LO#12: Discuss BC/DR in Google Cloud Platform (GCP)
  • LO#13: Discuss GCP Resources for Disaster Recovery (DR) and Business Continuity Plan (BCP)
  • LO#14: Understand Disaster Recovery for Data in GCP
  • LO#15: Understand Disaster Recovery for Applications in GCP
  • LO#16: Learn to Architect DR for Cloud Infrastructure Outages
  • LO#17: Learn to Implement BCDR in Google Cloud Platform (GCP)
  • LO#18: Discuss Partners Solutions for Implementing BCDR in GCP

Module 10: Governance, Risk management, and Compliance in Cloud

  • LO#01: Understand GRC in the Cloud
  • LO#02: Discuss Cloud Governance
  • LO#03: Learn to Implement and Maintain Governance for Cloud Computing
  • LO#04: Discuss Risk management in the Cloud
  • LO#05: Discuss Risk Management Framework and Process in the Cloud
  • LO#06: Understand Cloud Compliance
  • LO#07: Learn to Implement GRC in the cloud
  • LO#08: Understand GRC in Amazon Web Services (AWS)
  • LO#09: Understand GRC in Azure
  • LO#10: Understand GRC in Google Cloud Platform (GCP)

Module 11: Standards, Policies and Legal Issues in Cloud

  • LO#01: Understand Laws Impacting Cloud Computing
  • LO#02: Learn the Cloud Computing Standards
  • LO#03: Describe the Legal Frameworks for Data Protection and Privacy
  • LO#04: Learn Audit Planning and Reporting in the Cloud
  • LO#05: Describe Outsourcing and Vendor Management
  • LO#06: Understand Standards, Policies, and Auditing in AWS
  • LO#07: Understand Standards, Policies, and Auditing in Azure
  • LO#08: Understand Standards, Policies, and Auditing in GCP

Weitere Schulungen zu Thema EC-Council

Certified Incident Handler (ECIH)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts ...

Certified Network Defender (CND)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the ...

Certified Threat Intelligence Analyst (CTIA)

- u.a. in Frankfurt am Main, Hamburg, Wien, Düsseldorf, Freiburg

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known ...

CEH-v12 - Certified Ethical Hacker v12

- u.a. in Frankfurt am Main, Stuttgart, Düsseldorf, Essen, Darmstadt

The C|EH® v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans ...