Course Outline
Security Foundations & Shared Responsibility
- Cloud service models (IaaS, PaaS, SaaS) and where application security fits in each model
- Shared responsibility model and examples of customer vs provider responsibilities
- Security baselines and configuration standards (CIS benchmarks and provider best practices)
Identity, Access Management & Zero Trust
- Cloud IAM fundamentals: roles, policies, groups and least-privilege design
- Federation, single sign-on and multi-factor authentication in the cloud
- Principles of Zero Trust for cloud applications and network segmentation patterns
Secure Infrastructure & Platform Hardening
- Harden virtual machines, container hosts and managed services using prescriptive checklists
- Key management and encryption patterns (at-rest and in-transit); KMS concepts and secrets management
- Network controls, security groups, WAF basics and protecting service endpoints
Secure Software Development in the Cloud
- Secure SDLC concepts and “shift-left” practices: linting, SAST, dependency scanning and SCA integration
- Secure coding patterns and common pitfalls (OWASP Top Ten mapped to cloud contexts)
- Secrets handling in code and environment variables; supply chain considerations (dependencies and CI/CD runners)
Application Threats, Vulnerabilities and Mitigations
- Web application threats: broken access control, injection, misconfigurations, cryptographic failures and their cloud-specific manifestations
- API security: authentication, rate limiting, schema validation and API gateway controls
- Runtime protections: WAF tuning, RASP concepts and container runtime defenses
Testing, Scanning and Continuous Assessment
- SAST, DAST, IAST, dependency scanning and how to interpret and triage results
- Cloud posture and configuration assessment: CSPM/CNAPP tools, benchmarking and automated compliance checks
- Designing continuous monitoring: logging, telemetry, SIEM integration and alerting (CloudTrail, Azure Monitor, GCP Logging examples)
Penetration Testing and Vulnerability Management
- Planning safe cloud pentests: provider rules-of-engagement, scoping and legal considerations
- Common cloud attack paths and hands-on vulnerability exploitation demos in lab (controlled environment)
- Remediation workflows, patching strategies, and vulnerability tracking with KPIs
Data Security & Privacy in the Cloud
- Data classification, encryption architectures and tokenization patterns
- DBaaS and storage security: access controls, backups, and secure snapshots
- Privacy and compliance considerations: data residency, GDPR basics and contractual controls
Designing Secure Cloud-Native Applications
- Microservices, service meshes and secure communication patterns (mTLS, mutual auth)
- Container and Kubernetes security essentials: image hardening, scanning, and runtime policies
- Serverless security considerations: least privilege, event injection, and cold-start implications
Incident Response, Audit & Governance
- Incident detection and response in cloud environments: playbooks, forensics and evidence collection
- Audit and third-party assessment: penetration tests, security reviews and certification mapping
- Governance, policy automation and measuring security posture over time
Capstone Lab: Secure an Example Cloud Application
- Baseline review: run a cloud configuration scan and app SAST/DAST scans
- Implement fixes: IAM least-privilege, encryption, and CI/CD security gating
- Validate improvements and produce a remediation and monitoring roadmap
Summary and Next Steps
Requirements
- An understanding of general software development concepts
- Experience with at least one programming language or web stack
- Familiarity with basic networking and operating system concepts
Audience
- Developers
- Managers
- IT and security professionals
Testimonials (1)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job