EC Council Certified Cloud Security Engineer
Book online today or, if you need help choosing the right course or would like to discuss business discounts, call us on 0113 220 7150.
Virtual
From £2,885+VAT
Overview
Who Should Earn a Cloud Security Certification?
- Network security engineers
- Cybersecurity analysts
- Network security analysts
- Cloud administrators and engineers
- Network security administrators
- Cloud analysts
- Cybersecurity engineers
- Those working in network and cloud management and operations
Why Should You Become a Certified Cloud Security Engineer (C|CSE)?
Delegates will learn how to
- Plan, implement, and execute cloud platform security for an organization.
- Securely access cloud resources through identity and access management (IAM).
- Evaluate and control organizational cloud network architecture by integrating various security controls the service provider offers.
- Evaluate cloud storage techniques and threats on data stored in the cloud and understand how to protect cloud data from attacks.
- Implement and manage cloud security on various cloud platforms, such as AWS, Azure, and GCP.
- Understand the shared responsibility model of the service provider.
- Evaluate various cloud security standards, compliance programs, and features offered by AWS, Azure, and GCP, and perform cloud computing security audits.
- Implement various threat detection and response services provided by Azure, AWS, and GCP to identify threats to an organization’s cloud services.
- Evaluate and mitigate security risks, threats, and vulnerabilities in a cloud platform.
- Integrate best practices to secure cloud infrastructure components (network, storage and virtualization, and management).
- Secure organizational cloud applications by understanding the secure software development lifecycle of cloud applications and by implementing additional security controls to enhance the security of hosted cloud applications.
- Design and implement a GRC framework, a cloud incident response plan, and a business continuity plan for cloud services.
- Utilize the security services and tools provided in Azure, AWS, and GCP to secure the organizational cloud environment.
- Understand the legal implications associated with cloud computing to protect organizations.
- Implement operational controls and standards to build, operate, manage, and maintain the cloud infrastructure.
- Understand and implement security for private, multi-tenant, and hybrid cloud environments.
Outline
There are also 54 Labs included in this course:
- Implementing AWS Identity and Access Management
- Implementing Key Management Services
- Creating Secure EC2 Instances in AWS Virtual Private Cloud (VPC)
- Deploying a Secure Windows Server VM in Azure with Antimalware Extension Enabled
- Implementing Role-Based Access Control in Microsoft Azure
- Block Management Ports with Azure Security Center to Prevent Brute Force Login Attacks on Virtual Machines in Azure
- Securing GCP Instances using Firewall Rules
- Implementing a Private Secure Connection Between Instances with VPC Network Peering
- Implementing Role Based Access Control with GCP IAM
- Implementing Secure Deployments in GKE with Binary Authorization
- Implementing Web Application Firewall in AWS
- Enforcing Principle of Least Privilege with SAML based Single Sign-on in Azure
- Using Azure AD Multi-Factor Authentication Settings to Block and Unblock Microsoft Azure User
- Restricting Access to App Engine Applications in GCP with Cloud IAP
- Restricting access to S3 Bucket Object Using CloudFront
- Restricting Access to AWS S3 Buckets using ACL and Bucket Policy
- Restricting Non-SSL Access for S3 Objects using Bucket Policies
- Securing Amazon RDS from Accidental Deletion
- Preventing Deletion of Backups Using an Amazon Backup Vault Resource-based Access Policy
- Preventing Accidental Deletion and Modification of S3 Objects using S3 Object Lock
- Restricting Access to Azure Storage Account Using Shared Access Signature (SAS)
- Disabling Anonymous Access to Blob Container in Azure
- Preventing Accidental Deletion of Resources Using Azure Resource Locking
- Restricting Network Access to Azure Storage Account Using Virtual Network Service Endpoints
- Protecting Secrets in Azure with Key Vault
- Implementing Encryption and Decryption of Data with Google Cloud KMS
- Inspecting Sensitive Information in GCP with Cloud DLP
- Discovering Potential Security Issues using Amazon Inspector
- Monitoring User Activity using AWS CloudTrail
- Notifying Security Group Change using CloudTrail and CloudWatch
- Restricting Remote Desktop Access to Virtual Machines Using Network Security Group (NSG) in Azure
- Securing RDP/SSH Access to Azure Virtual Machines Using Azure Bastion
- Scanning for Vulnerabilities in App Engine Applications with Google Cloud Web Security Scanner
- Identifying Misconfigured S3 Buckets in AWS by Penetration Testing
- Identifying Publicly Accessible Data with Compromised AWS API Keys
- Detecting Compromise of Sensitive Data in S3 Buckets with Amazon Macie
- Creating Activity Log Alerts with Azure Monitor
- Monitoring Suspicious Network Traffic with VPC Flow Logs in GCP
- Detecting Incidents in GCP with Cloud Monitoring
- Examining Logs on Amazon CloudWatch Console
- Forensically Acquiring and Examining VM in Microsoft Azure
- Backup and Restore Failed EC2 Instance Using EBS Snapshot in AWS
- Implementing Backup of Amazon S3 Objects with Cross-Region Replication
- Recovering EC2 Instances using AMI Backup option
- Implementing Disaster Recovery in Azure using Storage Data Replication and Failover
- Implementing Backup and Restore of Virtual Machines with Azure Backup
- Creating Snapshot of a VM instance and Restoring the instance using the Snapshot in GCP
- Ensuring Service Availability using HTTP Load Balancing in GCP
- Investigating Compliance Findings using AWS Security Hub
- Restricting Deployment of S3 Buckets to a Specific Region using IAM Policy in AWS
- Enforce Compliance by Assigning In-built Policy and Creating Custom Policy in Azure
- Conducting Security Audit in AWS with AWS Trusted Advisor
- Auditing Compliance of Azure Resources by creating Policy Assignments with Azure Policy
- Conducting Audits in GCP with Cloud Audit Logs
Why choose QA
- Award-winning training, top NPS scores
- Nearly 300,000 learners in 2020
- Our training experts are industry leaders
- Read more about QA
Special Notices
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.






Cyber Security for Cloud learning paths
Want to boost your career in cyber security for Cloud? Click on the role below to see QA's learning pathways, specially designed to give you the skills to succeed.




Frequently asked questions
See all of our FAQsHow can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
Learn more about our Virtual Classrooms.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
Learn more about QA’s online courses.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.