starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Curriculum
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Securing Cloud Operations

Securing Cloud Operations

Learn hands-on cloud security for AWS, Azure, and GCP. Configure IAM, firewalls, and encryption; enable GuardDuty and Defender; and map controls to CIS, ISO, and NIST frameworks to build and audit secure, compliant cloud operations.

Luca Berton
Luca Berton
Cybersecurity | intermediate | 9 hours |   Published: Oct 2025

    Discussions

Overview

STUDENTS*
RECOMMEND*

This course includes:

  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

Are You Ready to Secure Your First Cloud Project? 
The cloud is where today’s ideas turn into tomorrow’s apps—but an unsecured virtual machine, open storage bucket, or forgotten access key can derail that dream overnight. Securing Cloud Operations is a straightforward, step-by-step course that teaches absolute beginners how to set up, strengthen, and review a small web stack on AWS, Azure, or Google Cloud using only free-tier services and simple checklists. 

You will learn why service models (IaaS, PaaS, SaaS) matter, how the shared-responsibility model works, and which one-click security features offer instant protection. By the end, you’ll have tested your VM against the CIS Benchmark, exported evidence for an audit folder, and walked away with a printable ten-control checklist you can apply to every future project. 

Skills You Will Gain

Cloud Security
Cloud Operations
IaaS security
PaaS security
SaaS security

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Differentiate the security responsibilities of the cloud provider vs. the customer across IaaS, PaaS, and SaaS service models. 
  • Configure identity- and network-based controls—such as IAM roles, security groups, and VPC firewalls—across AWS, Azure, and Google Cloud to enforce least-privilege access. 
  • Deploy and operationalize cloud-native security services (e.g., AWS GuardDuty, Azure Defender, Google Cloud SCC) to detect threats and manage incident response workflows. 
  • Map application and infrastructure workloads to compliance frameworks including CIS Benchmarks, ISO/IEC 27001, and the NIST Cybersecurity Framework, producing evidence artifacts for audits. 

Prerequisites

Networking & virtualization basics, familiarity with at least one public cloud platform

Who Should Attend

Cloud engineers, DevOps engineers, Security analysts, Solution architects 

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Chapter 1: Understand Cloud Service Models (IaaS, PaaS, SaaS)
2Chapter 2: Classify Compute, Storage, and Networking Resources
3Chapter 3: Apply Shared Responsibility and Set Up IAM Basics
4Chapter 4: Harden a Virtual Machine Before Use
5Chapter 5: Control Network Access with Security Groups and Firewalls
6Chapter 6: Protect Data in Databases and Storage Buckets
7Chapter 7: Detect Threats Using Built-In Security Tools
8Chapter 8: Investigate Cloud Activity with Logs
9Chapter 9: Respond to Incidents with Minimal Tools
10Chapter 10: Map Security Controls to CIS, ISO 27001, and NIST CSF
11Chapter 11: Automate Governance with Tags and Config Rules
12Chapter 12: Conduct a Final Security Review and Plan Next Steps

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 05 - Recognize the Components of a Virtual Machine

Segment 06 - Explore Database and Object Storage Options

Segment 07 - Visualize Cloud Networking and Firewall Concepts

Segment 08 - Reading: Glossary: Compute-Storage-Network

Luca Berton

Luca Berton

Luca is a cloud-native engineering leader and Ansible automation expert with 18+ years of experience designing and operating large-scale, secure infrastructure across AWS, Azure, and GCP. Previously, I served as Vice President of Infrastructure at JPMorgan Chase & Co. At Dell Technologies, I help global banks and ESG startups build resilient, automated platforms—from disaster recovery for hundresd of thousands or containers and VMs to AI-driven ESG calculators used by 100+ SMEs. Luca is also a published technical author (Kubernetes, Ansible, RHEL, RHCE exam prep) and course instructor with Coursera, Pluralsight, and Educative, teaching topics like MLOps, Kubernetes, Azure, and infrastructure automation. Creator of Ansible & Terraform Pilot project reaches around 50,000 views per month, with 500+ hands-on use cases and troubleshooting guides. Luca enjoy turning complex infrastructure into simple, reliable automation and helping learners build practical, job-ready skills in cloud, DevOps, and automation.
VIEW MY CHANNEL

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 00 - Introduction to Course

Segment 01 - Identify IaaS_ PaaS_ and SaaS Services

Segment 02 - Compare Cloud Providers and Launch Core Services

Segment 03 - Multi-Cloud Zero Trust Architecture

Segment 04 - Reading: Service-Model Cheat-Sheet

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 19 - Explain Port Rules with Real-World Analogies

Segment 20 - Build a Web-Only Security Group

Segment 21 - Validate Security Group Rules Using cURL and Analyzer Tools

Segment 22 - Reading: Security-Group Starter Template

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 09 - Explain Shared Responsibility Using Pizza-as-a-Service

Segment 10 - Create a Least-Privilege IAM User

Segment 11 - Enable Multi-Factor Authentication (MFA) on an Account

Segment 12 - Reading: Step-by-Step IAM Setup

Segment 14 - Hands-On-Learning: Building a Shared Responsibility Matrix in the Cloud

Segment 13 - Quiz - Apply Shared Responsibility and Set Up IAM Basics

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 36 - Revoke Compromised Access Keys Immediately

Segment 37 - Capture a Snapshot for Forensic Analysis

Segment 38 - Complete a Post-Mortem Using a Simple Template

Segment 39 - Reading: One-Page IR Checklist

Segment 40 - Quiz - Respond to Incidents with Minimal Tools

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 23 - Enable Encryption at Rest Using Managed Keys

Segment 24 - Prevent Public Access to Bucket

Segment 25 - Set Up Backup and Snapshot Schedules

Segment 26 - Reading: Storage Safety Checklist

Segment 28 - Hands-On-Learning - Designing a Secure Cloud Architecture with Compute, Network, and Storage Controls

Segment 27 - Quiz - Protect Data in Databases and Storage Buckets

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 32 - Enable Logging for Cloud API Activity

Segment 33 - Search Logs for Risky Events (e.g._ DeleteStop)

Segment 34 - Export Logs for Retention and Audit

Segment 35 - Reading: Log Query Cheat-Sheet

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 41 - Compare Popular Security Frameworks

Segment 42 - Apply the CIS Ubuntu Benchmark to a VM

Segment 43 - Use a Matrix to Map Controls Across Frameworks

Segment 44 - Reading: CIS “Essential Eight” Summary

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 49 - Review the 10 Must-Do Security Controls

Segment 50 - Complete a Capstone Self-Audit Using a Checklist

Segment 51 - Explore Certification and Learning Paths

Segment 52 - Hands-On-Learning - Building a Compliance & Cost Dashboard for Cloud Governance

Segment 55 - Course Wrap-up Video

Segment 54 - Project - Cloud Security Operations

Segment 53 - Quiz Conduct a Final Security Review and Plan Next Steps

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 45 - Tag Cloud Resources for Ownership and Cost Tracking

Segment 46 - Generate Cost and Compliance Reports

Segment 47 - Enforce “No Public Buckets” with a Config Rule

Segment 48 - Reading: Starter Tag Kit (CSV)

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 29 - Activate Guard Duty_ Azure Defender_ or Google SCC

Segment 30 - Interpret Sample Security Findings

Segment 31 - Triage Low-Severity and False Positive Alerts (1)

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 15 - Chapter Introduction

Segment 16 - Launch a Secure OS Image from a Trusted Source

Segment 17 - Enable Automatic Patching and Logging

Segment 18 - Configure SSH Key-Based Access and Disable Passwords