Course Outline

Security Foundations & Shared Responsibility

  • Cloud service models (IaaS, PaaS, SaaS) and where application security fits in each model
  • Shared responsibility model and examples of customer vs provider responsibilities
  • Security baselines and configuration standards (CIS benchmarks and provider best practices)

Identity, Access Management & Zero Trust

  • Cloud IAM fundamentals: roles, policies, groups and least-privilege design
  • Federation, single sign-on and multi-factor authentication in the cloud
  • Principles of Zero Trust for cloud applications and network segmentation patterns

Secure Infrastructure & Platform Hardening

  • Harden virtual machines, container hosts and managed services using prescriptive checklists
  • Key management and encryption patterns (at-rest and in-transit); KMS concepts and secrets management
  • Network controls, security groups, WAF basics and protecting service endpoints

Secure Software Development in the Cloud

  • Secure SDLC concepts and “shift-left” practices: linting, SAST, dependency scanning and SCA integration
  • Secure coding patterns and common pitfalls (OWASP Top Ten mapped to cloud contexts)
  • Secrets handling in code and environment variables; supply chain considerations (dependencies and CI/CD runners)

Application Threats, Vulnerabilities and Mitigations

  • Web application threats: broken access control, injection, misconfigurations, cryptographic failures and their cloud-specific manifestations
  • API security: authentication, rate limiting, schema validation and API gateway controls
  • Runtime protections: WAF tuning, RASP concepts and container runtime defenses

Testing, Scanning and Continuous Assessment

  • SAST, DAST, IAST, dependency scanning and how to interpret and triage results
  • Cloud posture and configuration assessment: CSPM/CNAPP tools, benchmarking and automated compliance checks
  • Designing continuous monitoring: logging, telemetry, SIEM integration and alerting (CloudTrail, Azure Monitor, GCP Logging examples)

Penetration Testing and Vulnerability Management

  • Planning safe cloud pentests: provider rules-of-engagement, scoping and legal considerations
  • Common cloud attack paths and hands-on vulnerability exploitation demos in lab (controlled environment)
  • Remediation workflows, patching strategies, and vulnerability tracking with KPIs

Data Security & Privacy in the Cloud

  • Data classification, encryption architectures and tokenization patterns
  • DBaaS and storage security: access controls, backups, and secure snapshots
  • Privacy and compliance considerations: data residency, GDPR basics and contractual controls

Designing Secure Cloud-Native Applications

  • Microservices, service meshes and secure communication patterns (mTLS, mutual auth)
  • Container and Kubernetes security essentials: image hardening, scanning, and runtime policies
  • Serverless security considerations: least privilege, event injection, and cold-start implications

Incident Response, Audit & Governance

  • Incident detection and response in cloud environments: playbooks, forensics and evidence collection
  • Audit and third-party assessment: penetration tests, security reviews and certification mapping
  • Governance, policy automation and measuring security posture over time

Capstone Lab: Secure an Example Cloud Application

  • Baseline review: run a cloud configuration scan and app SAST/DAST scans
  • Implement fixes: IAM least-privilege, encryption, and CI/CD security gating
  • Validate improvements and produce a remediation and monitoring roadmap

Summary and Next Steps

Requirements

  • An understanding of general software development concepts
  • Experience with at least one programming language or web stack
  • Familiarity with basic networking and operating system concepts

Audience

  • Developers
  • Managers
  • IT and security professionals
 21 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories