Get in Touch

Course Outline

Security Foundations & Shared Responsibility

  • Cloud service models (IaaS, PaaS, SaaS) and the role of application security within each.
  • The shared responsibility model, with examples distinguishing customer versus provider responsibilities.
  • Security baselines and configuration standards, including CIS benchmarks and provider best practices.

Identity, Access Management & Zero Trust

  • Cloud IAM fundamentals: roles, policies, groups, and least-privilege design.
  • Federation, single sign-on, and multi-factor authentication in the cloud.
  • Zero Trust principles for cloud applications and network segmentation patterns.

Secure Infrastructure & Platform Hardening

  • Hardening virtual machines, container hosts, and managed services using prescriptive checklists.
  • Key management and encryption patterns (at-rest and in-transit); KMS concepts and secrets management.
  • Network controls, security groups, WAF basics, and protecting service endpoints.

Secure Software Development in the Cloud

  • Secure SDLC concepts and 'shift-left' practices: linting, SAST, dependency scanning, and SCA integration.
  • Secure coding patterns and common pitfalls (OWASP Top Ten mapped to cloud contexts).
  • Secrets handling in code and environment variables; supply chain considerations (dependencies and CI/CD runners).

Application Threats, Vulnerabilities and Mitigations

  • Web application threats: broken access control, injection, misconfigurations, cryptographic failures, and their cloud-specific manifestations.
  • API security: authentication, rate limiting, schema validation, and API gateway controls.
  • Runtime protections: WAF tuning, RASP concepts, and container runtime defenses.

Testing, Scanning and Continuous Assessment

  • SAST, DAST, IAST, dependency scanning, and how to interpret and triage results.
  • Cloud posture and configuration assessment: CSPM/CNAPP tools, benchmarking, and automated compliance checks.
  • Designing continuous monitoring: logging, telemetry, SIEM integration, and alerting (with examples from CloudTrail, Azure Monitor, and GCP Logging).

Penetration Testing and Vulnerability Management

  • Planning safe cloud pentests: provider rules-of-engagement, scoping, and legal considerations.
  • Common cloud attack paths and hands-on vulnerability exploitation demonstrations in a controlled lab environment.
  • Remediation workflows, patching strategies, and vulnerability tracking with KPIs.

Data Security & Privacy in the Cloud

  • Data classification, encryption architectures, and tokenization patterns.
  • DBaaS and storage security: access controls, backups, and secure snapshots.
  • Privacy and compliance considerations: data residency, GDPR basics, and contractual controls.

Designing Secure Cloud-Native Applications

  • Microservices, service meshes, and secure communication patterns (mTLS, mutual auth).
  • Container and Kubernetes security essentials: image hardening, scanning, and runtime policies.
  • Serverless security considerations: least privilege, event injection, and cold-start implications.

Incident Response, Audit & Governance

  • Incident detection and response in cloud environments: playbooks, forensics, and evidence collection.
  • Audit and third-party assessment: penetration tests, security reviews, and certification mapping.
  • Governance, policy automation, and measuring security posture over time.

Capstone Lab: Secure an Example Cloud Application

  • Baseline review: run a cloud configuration scan and app SAST/DAST scans.
  • Implement fixes: IAM least-privilege, encryption, and CI/CD security gating.
  • Validate improvements and produce a remediation and monitoring roadmap.

Summary and Next Steps

Requirements

  • An understanding of general software development concepts.
  • Experience with at least one programming language or web stack.
  • Familiarity with basic networking and operating system concepts.

Audience

  • Developers.
  • Managers.
  • IT and security professionals.
 21 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 3900 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (1)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories