Department of Cybersecurity, Faculty of Computing, University of Port Harcourt

Cloud Security Essentials (C|SE)

Version 1, Labs w/CTF, Exam Prep, ECC EV

Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Cloud Security

Self Paced (Discount)

₦197,183

Tutor Led (Discount)

₦297,183

Official Price

₦508,300

EC-Council Cloud Security Essentials

Cloud Security Essentials is a foundational course covering cloud computing and security fundamentals, data protection and encryption in the cloud and more. This course prepares you to secure identities, data, and applications within cloud providers and hybrid infrastructures. No IT/Cybersecurity experience required for this course.

Test your skills with Capstone Projects and validate these newly acquired skills in proctored exams. With 6 hands-on labs and 10+ hours of premium training, the C|SE provides learners with practical skills to secure cloud solutions.

Key Features
  • 6 lab practical exercises
  • 10+ hours of premium self-paced video training
  • 900+ pages of ecourseware
  • Capstone Projects with Real-World CTF Challenges
  • Gain a year-long access to courseware and 6-month access to labs
  • Proctored exam voucher with one-year validity
  • Gain the globally recognized EC-Council’s certification
  • Learn about cloud adoption to cloud security with easy-to-follow modules
  • Enhance your relevancy in the job market

Cloud Security Essentials (C|SE) Program Information

Module 1: Cloud Computing and Security Fundamentals

This module will introduce you to the course and provide foundational information about cloud infrastructure and security.

Student Objectives:

Students will learn the cloud principles and terminology essential for talking to customers and cloud engineers.

Students will be introduced to key cloud security concepts and threats and attacks that are common in cloud environments.

After completing this module, students will have these foundational cloud and cloud security principles, as well as the key understanding of design and architecture necessary for the rest of the course.

Topics Covered:

Cloud Computing Types and Service Models

Cloud Security Challenges and Concerns

Cloud and Security Responsibility

Evaluating Cloud Service Providers

Cloud Security Benefits

Threats and Attacks in Cloud Environments

Cloud Security Design Principles

Cloud Security Architecture

Module 2: Identity and Access Management (IAM) in the Cloud

This module will focus on the protection of identity and access management. This will include how to protect users and assign proper permissions.

Labs: Assign roles and enforce MFA in AWS, and implement roles and enforce MFA with conditional access policies in Azure.

Module Objectives:

Students will learn identity and access principles and concepts to protect the perimeter of the cloud.

Students will understand the key concepts for protecting identity and access.

After completing this module, students will be able to comprehend the importance of identity and access management, as well as the concepts for monitoring and managing users and identities.

Topics Covered:

IAM Fundamentals

Principal and Roles of IAM in the Cloud

Role-based Access Control (RBAC)

Identity Federation

Single Sign-on (SSO) and Self-Service Password Reset (SSPR)

Multifactor Authentication (MFA)

Principle of Least Privilege

IAM Auditing and Monitoring

Module 3: Data Protection and Encryption in the Cloud

This module will provide information on how to protect data from loss and unauthorized access.

Labs: Set up KMS in AWS, set up Key Vault in Azure, and create DLP policies in M365

Module Objectives:

Students will learn the key concepts for protecting data in the cloud.

Students will grasp the importance of understanding the data the company stores and avoiding exposure to sensitive data.

After completing this module, students will be able to explore the concepts and techniques for encrypting and protecting data within a cloud environment.

Topics Covered:

Data Classification and Lifecycle

Encryption Techniques (at Rest, in Transit)

Customer vs. Cloud Provider Managed Keys

Data Loss Prevention (DLP)

Backup and Disaster Recovery Strategies

Module 4: Network Security in Cloud

This module will teach you how to securely architect your network to protect against unauthorized access and detect potential network attacks.

Labs: Create a VPC and configure NACL and NSG in AWS, as well as create a VNET and configure an NSG in Azure.

Module Objectives:

Students will learn the concepts of networking in the cloud and how to architect public and private network communication.

Students will be introduced to cloud connections within cloud, hybrid, and multi-cloud networks.

After completing this module, students will have a foundational understanding of network connectivity and communications within a cloud and hybrid architecture and how to secure these connections.

Topics Covered:

Cloud Network Fundamentals

Virtual Private Clouds (VPC)

Network Isolation and Segmentation

Network Access Control Lists (NACLs) and Network Security Groups (NSG)

Remote Access and Connections

Firewalls and Intrusion Detection

Module 5: Application Security in Cloud

This module will show you how to secure applications, web access, and databases in cloud environments.

Labs: Create an application gateway with WAF and create a WAF in AWS.

Student Objectives:

Students will learn the fundamental security concepts for protecting applications within the cloud.

Students will be introduced to application threats and vulnerabilities and how to architect the protection of these applications within development and the network.

After completing this module, students will understand fundamental application development concepts and how to provide security within the development process. They will also understand the network and code security techniques that will secure applications.

Topics Covered:

Secure Software Development Lifecycle (SDLC) in the Cloud

Web Application Firewall (WAF) in Cloud Environments

Web Application Security and OWASP Top Ten

Security by Design Principles for Cloud Applications

Secure Coding Practices

API Security and Integration Best Practices

Serverless Security Considerations

Container Security (Docker, Kubernetes)

Module 6: Cloud Security Monitoring and Incident Response

This module will introduce you to the foundations of security operations, including logging activity and events, identifying threats and intrusions, and responding to incidents.

Labs: Configure Azure Sentinel, configure workload protection for Microsoft Defender for the Cloud, configure Guard Duty on AWS, and configure Security Hub on AWS.

Module Objectives:

Students will learn the importance of logging and monitoring activity within the cloud environment as a proactive security strategy.

Students will be introduced to logging and monitoring solutions and how automation can be used to identify and respond to threats.

After completing this module, students will understand the foundational concepts and techniques for security operations.

Topics Covered:

Cloud Logging

Cloud Security Monitoring

SIEM and SOAR

Cloud-native Monitoring Solutions

Continuous Security Monitoring Strategies

Cloud Security Monitoring Best Practices

Incident Response in Cloud

Module 7: Cloud Security Risk Assessment and Management

This module will discuss the process of risk analysis, assessment, and management.

Module Objectives:

Students will learn about risk management frameworks and strategies for risk assessments.

Students will be introduced to how to assess risk and techniques for risk analysis.

After completing this module, students will understand the importance of a risk management framework and determining a company’s risk and risk tolerance through risk analysis techniques.

Topics Covered:

Identifying Cloud Security Risks

Risk Assessment Frameworks for Cloud Environments

Cloud Security Controls and Countermeasures

Threat Modeling and Vulnerability Assessment in Cloud Environments

Quantitative vs. Qualitative Risk Assessment Approaches

Cloud Risk Treatment, Response, and Mitigation

Module 8: Cloud Compliance and Governance

This module will discuss the various regulatory and legal standards that you may need to adhere to within your company jurisdiction and how to maintain compliance within the cloud infrastructure.

Labs: Configure regulatory compliance in Azure and configure AWS Config for CIS standards.

Module Objectives:

Students will learn about the primary industry, regulatory, and national standards that govern compliance for companies.

Students will be introduced to cloud capabilities and solutions for monitoring and managing compliance within cloud and hybrid environments.

After completing this module, students will understand the role of regulations and standards on compliance within cloud and hybrid architectures.

Topics Covered:

Regulatory and Industry Compliance

Cloud Security Standards

Cloud Security Governance and Risk Management

Auditing and Monitoring Cloud Resources

Cloud Security Assessment and Penetration Testing

  • Learn the fundamentals of cloud computing and security.
  • Explore identity and access management in the cloud.
  • Learn about data protection and encryption in the cloud.
  • Gain knowledge of network security in cloud environments.
  • Dive deep into application security in cloud environments.
  • Gain insights on cloud security monitoring and incident response.
  • Explore cloud security risk assessment and management.
  • Understand the basics of cloud compliance and governance.
  • Students, professionals, career starters and changers, and IT/ technology/cybersecurity teams with little or no work experience.
  • Professionals securing public, private, and hybrid cloud infrastructures, identities, data, and applications.
  • IT professionals, system administrators, cloud administrators, cybersecurity operations and administrators, engineers, and architects.
  • Anyone who wants to start a career in cybersecurity, cloud security, or network security and is interested in cloud technology.

Training Details: Self-paced in-demand lecture videos led by world-class instructors and hands-on labs.

Pre-requisite: No prior cybersecurity knowledge or IT work experience required.

Exam Details:

Exam Code: 112-54

Number of Questions: 75

Duration: 2 hours

Test Format: Multiple Choice

Secure Your Future in Cybersecurity !!!

  • 100% Discount on Training Fees
  • Tutor-Led Training at an Affordable Rate
  • 12-Month Access to Labs & Study Materials
  • Earn Globally Recognized EC-Council Certifications