Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Security Foundations & Shared Responsibility
- Cloud service models (IaaS, PaaS, SaaS) and the role of application security within each
- The shared responsibility model with examples distinguishing customer versus provider obligations
- Security baselines and configuration standards, including CIS benchmarks and provider best practices
Identity, Access Management & Zero Trust
- Fundamentals of Cloud IAM: roles, policies, groups, and least-privilege design
- Federation, single sign-on, and multi-factor authentication in cloud environments
- Zero Trust principles for cloud applications and network segmentation patterns
Secure Infrastructure & Platform Hardening
- Hardening virtual machines, container hosts, and managed services using prescriptive checklists
- Key management and encryption patterns (at-rest and in-transit); understanding KMS and secrets management
- Network controls, security groups, WAF basics, and protecting service endpoints
Secure Software Development in the Cloud
- Secure SDLC concepts and shift-left practices: linting, SAST, dependency scanning, and SCA integration
- Secure coding patterns and common pitfalls (OWASP Top Ten mapped to cloud contexts)
- Handling secrets in code and environment variables; supply chain considerations (dependencies and CI/CD runners)
Application Threats, Vulnerabilities and Mitigations
- Web application threats: broken access control, injection, misconfigurations, cryptographic failures, and their cloud-specific manifestations
- API security: authentication, rate limiting, schema validation, and API gateway controls
- Runtime protections: WAF tuning, RASP concepts, and container runtime defenses
Testing, Scanning and Continuous Assessment
- SAST, DAST, IAST, dependency scanning, and techniques for interpreting and triaging results
- Cloud posture and configuration assessment: CSPM/CNAPP tools, benchmarking, and automated compliance checks
- Designing continuous monitoring: logging, telemetry, SIEM integration, and alerting (with examples from CloudTrail, Azure Monitor, and GCP Logging)
Penetration Testing and Vulnerability Management
- Planning safe cloud penetration tests: provider rules of engagement, scoping, and legal considerations
- Common cloud attack paths and hands-on vulnerability exploitation demonstrations in a controlled lab environment
- Remediation workflows, patching strategies, and vulnerability tracking using KPIs
Data Security & Privacy in the Cloud
- Data classification, encryption architectures, and tokenization patterns
- DBaaS and storage security: access controls, backups, and secure snapshots
- Privacy and compliance considerations: data residency, GDPR basics, and contractual controls
Designing Secure Cloud-Native Applications
- Microservices, service meshes, and secure communication patterns (mTLS, mutual authentication)
- Container and Kubernetes security essentials: image hardening, scanning, and runtime policies
- Serverless security considerations: least privilege, event injection, and cold-start implications
Incident Response, Audit & Governance
- Incident detection and response in cloud environments: playbooks, forensics, and evidence collection
- Audit and third-party assessment: penetration tests, security reviews, and certification mapping
- Governance, policy automation, and measuring security posture over time
Capstone Lab: Secure an Example Cloud Application
- Baseline review: executing a cloud configuration scan and application SAST/DAST scans
- Implementing fixes: enforcing IAM least-privilege, encryption, and CI/CD security gating
- Validating improvements and producing a remediation and monitoring roadmap
Summary and Next Steps
Requirements
- A foundational understanding of general software development concepts
- Experience with at least one programming language or web stack
- Familiarity with basic networking and operating system principles
Audience
- Developers
- Managers
- IT and security professionals
21 Hours
Testimonials (1)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job