Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Security Foundations & Shared Responsibility
- Cloud service models (IaaS, PaaS, SaaS) and where application security fits in each model
- Shared responsibility model and examples of customer vs provider responsibilities
- Security baselines and configuration standards (CIS benchmarks and provider best practices)
Identity, Access Management & Zero Trust
- Cloud IAM fundamentals: roles, policies, groups and least-privilege design
- Federation, single sign-on and multi-factor authentication in the cloud
- Principles of Zero Trust for cloud applications and network segmentation patterns
Secure Infrastructure & Platform Hardening
- Harden virtual machines, container hosts and managed services using prescriptive checklists
- Key management and encryption patterns (at-rest and in-transit); KMS concepts and secrets management
- Network controls, security groups, WAF basics and protecting service endpoints
Secure Software Development in the Cloud
- Secure SDLC concepts and “shift-left” practices: linting, SAST, dependency scanning and SCA integration
- Secure coding patterns and common pitfalls (OWASP Top Ten mapped to cloud contexts)
- Secrets handling in code and environment variables; supply chain considerations (dependencies and CI/CD runners)
Application Threats, Vulnerabilities and Mitigations
- Web application threats: broken access control, injection, misconfigurations, cryptographic failures and their cloud-specific manifestations
- API security: authentication, rate limiting, schema validation and API gateway controls
- Runtime protections: WAF tuning, RASP concepts and container runtime defenses
Testing, Scanning and Continuous Assessment
- SAST, DAST, IAST, dependency scanning and how to interpret and triage results
- Cloud posture and configuration assessment: CSPM/CNAPP tools, benchmarking and automated compliance checks
- Designing continuous monitoring: logging, telemetry, SIEM integration and alerting (CloudTrail, Azure Monitor, GCP Logging examples)
Penetration Testing and Vulnerability Management
- Planning safe cloud pentests: provider rules-of-engagement, scoping and legal considerations
- Common cloud attack paths and hands-on vulnerability exploitation demos in lab (controlled environment)
- Remediation workflows, patching strategies, and vulnerability tracking with KPIs
Data Security & Privacy in the Cloud
- Data classification, encryption architectures and tokenization patterns
- DBaaS and storage security: access controls, backups, and secure snapshots
- Privacy and compliance considerations: data residency, GDPR basics and contractual controls
Designing Secure Cloud-Native Applications
- Microservices, service meshes and secure communication patterns (mTLS, mutual auth)
- Container and Kubernetes security essentials: image hardening, scanning, and runtime policies
- Serverless security considerations: least privilege, event injection, and cold-start implications
Incident Response, Audit & Governance
- Incident detection and response in cloud environments: playbooks, forensics and evidence collection
- Audit and third-party assessment: penetration tests, security reviews and certification mapping
- Governance, policy automation and measuring security posture over time
Capstone Lab: Secure an Example Cloud Application
- Baseline review: run a cloud configuration scan and app SAST/DAST scans
- Implement fixes: IAM least-privilege, encryption, and CI/CD security gating
- Validate improvements and produce a remediation and monitoring roadmap
Summary and Next Steps
Requirements
- An understanding of general software development concepts
- Experience with at least one programming language or web stack
- Familiarity with basic networking and operating system concepts
Audience
- Developers
- Managers
- IT and security professionals
21 Hours
Testimonials (1)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job