Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Security Foundations & Shared Responsibility
- Cloud service models (IaaS, PaaS, SaaS) and the role of application security within each model
- The shared responsibility model, with examples of customer versus provider responsibilities
- Security baselines and configuration standards, including CIS benchmarks and provider best practices
Identity, Access Management & Zero Trust
- Fundamentals of cloud IAM: roles, policies, groups, and least-privilege design
- Federation, single sign-on, and multi-factor authentication in cloud environments
- Zero Trust principles for cloud applications and network segmentation patterns
Secure Infrastructure & Platform Hardening
- Hardening virtual machines, container hosts, and managed services using prescriptive checklists
- Key management and encryption patterns (at-rest and in-transit); KMS concepts and secrets management
- Network controls, security groups, WAF basics, and protecting service endpoints
Secure Software Development in the Cloud
- Secure SDLC concepts and "shift-left" practices: linting, SAST, dependency scanning, and SCA integration
- Secure coding patterns and common pitfalls (OWASP Top Ten mapped to cloud contexts)
- Secrets handling in code and environment variables; supply chain considerations (dependencies and CI/CD runners)
Application Threats, Vulnerabilities, and Mitigations
- Web application threats: broken access control, injection, misconfigurations, cryptographic failures, and their cloud-specific manifestations
- API security: authentication, rate limiting, schema validation, and API gateway controls
- Runtime protections: WAF tuning, RASP concepts, and container runtime defenses
Testing, Scanning, and Continuous Assessment
- SAST, DAST, IAST, dependency scanning, and methods for interpreting and triaging results
- Cloud posture and configuration assessment: CSPM/CNAPP tools, benchmarking, and automated compliance checks
- Designing continuous monitoring: logging, telemetry, SIEM integration, and alerting (examples from CloudTrail, Azure Monitor, GCP Logging)
Penetration Testing and Vulnerability Management
- Planning safe cloud penetration tests: provider rules of engagement, scoping, and legal considerations
- Common cloud attack paths and hands-on vulnerability exploitation demos in a controlled lab environment
- Remediation workflows, patching strategies, and vulnerability tracking with KPIs
Data Security & Privacy in the Cloud
- Data classification, encryption architectures, and tokenization patterns
- DBaaS and storage security: access controls, backups, and secure snapshots
- Privacy and compliance considerations: data residency, GDPR basics, and contractual controls
Designing Secure Cloud-Native Applications
- Microservices, service meshes, and secure communication patterns (mTLS, mutual auth)
- Container and Kubernetes security essentials: image hardening, scanning, and runtime policies
- Serverless security considerations: least privilege, event injection, and cold-start implications
Incident Response, Audit & Governance
- Incident detection and response in cloud environments: playbooks, forensics, and evidence collection
- Audit and third-party assessment: penetration tests, security reviews, and certification mapping
- Governance, policy automation, and measuring security posture over time
Capstone Lab: Securing an Example Cloud Application
- Baseline review: executing cloud configuration scans and app SAST/DAST scans
- Implementing fixes: IAM least-privilege, encryption, and CI/CD security gating
- Validating improvements and producing a remediation and monitoring roadmap
Summary and Next Steps
Requirements
- Understanding of general software development principles
- Experience with at least one programming language or web stack
- Familiarity with basic networking and operating system concepts
Audience
- Developers
- Managers
- IT and security professionals
21 Hours
Testimonials (1)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job