EC-Council Cloud Security Essentials (CSE)
This course will provide you with the skills that you need to understand the foundational and essential aspects of Cloud Security. You will learn the fundamentals of cloud computing and the essential aspects of securing identities, data, and applications within cloud providers and hybrid infrastructures. Put your newly acquired abilities to the test in our exhilarating Capstone project to develop the hands-on proficiencies essential for success in your cyber professional role. After completing this course, you will be prepared to move toward a career in cloud security and take the next steps in cloud security certifications.
- Learn the fundamentals of cloud computing and security.
- Explore identity and access management in the cloud.
- Learn about data protection and encryption in the cloud.
- Gain knowledge of network security in cloud environments.
- Dive deep into application security in cloud environments.
- Gain insights on cloud security monitoring and incident response.
- Explore cloud security risk assessment and management.
- Understand the basics of cloud compliance and governance.
- School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
- Anyone who wants to start a career in cybersecurity, cloud security, or network security and is interested in cloud technology.
- Professionals securing public, private, and hybrid cloud infrastructures, identities, data, and applications.
- IT professionals, system administrators, cloud administrators, cybersecurity operations and administrators, engineers, and architects.
The EC-Council Cloud Security Essentials (CSE) course has no strict prerequisites, but basic knowledge of cloud computing concepts, network security, and IT infrastructure is recommended.
- Cloud Computing Types and Service Models
- Cloud Security Challenges and Concerns
- Cloud and Security Responsibility
- Evaluating Cloud Service Providers
- Cloud Security Benefits
- Threats and Attacks in Cloud Environments
- Cloud Security Design Principles
- Cloud Security Architecture
- IAM Fundamentals
- Principal and Roles of IAM in the Cloud
- Role-based Access Control (RBAC)
- Identity Federation
- Single Sign-on (SSO) and Self-Service Password Reset (SSPR)
- Multifactor Authentication (MFA)
- Principle of Least Privilege
- IAM Auditing and Monitoring
- Data Classification and Lifecycle
- Encryption Techniques (at Rest, in Transit)
- Customer vs. Cloud Provider Managed Keys
- Data Loss Prevention (DLP)
- Backup and Disaster Recovery Strategies
- Cloud Network Fundamentals
- Virtual Private Clouds (VPC)
- Network Isolation and Segmentation
- Network Access Control Lists (NACLs) and Network Security Groups (NSG)
- Remote Access and Connections
- Firewalls and Intrusion Detection
- Secure Software Development Lifecycle (SDLC) in the Cloud
- Web Application Firewall (WAF) in Cloud Environments
- Web Application Security and OWASP Top Ten
- Security by Design Principles for Cloud Applications
- Secure Coding Practices
- API Security and Integration Best Practices
- Serverless Security Considerations
- Container Security (Docker, Kubernetes)
- Cloud Logging
- Cloud Security Monitoring
- SIEM and SOAR
- Cloud-native Monitoring Solutions
- Continuous Cloud Security Monitoring
- Incident Response and Investigation in the Cloud
- Regulatory and Industry Compliance
- Cloud Security Standards
- Cloud Security Governance and Risk Management
- Auditing and Monitoring Cloud Resources
- Cloud Security Assessment and Penetration Testing
- Regulatory and Industry Compliance
- Cloud Security Standards
- Cloud Security Governance and Risk Management
- Auditing and Monitoring Cloud Resources
- Cloud Security Assessment and Penetration Testing