Securing Cloud Operations

Learn hands-on cloud security for AWS, Azure, and GCP. Configure IAM, firewalls, and encryption; enable GuardDuty and Defender; and map controls to CIS, ISO, and NIST frameworks to build and audit secure, compliant cloud operations.

Luca Berton
Published: Oct 2025
Intermediate
Cybersecurity
9 hours
Securing Cloud Operations

Course Overview

Are You Ready to Secure Your First Cloud Project? 
The cloud is where today’s ideas turn into tomorrow’s apps—but an unsecured virtual machine, open storage bucket, or forgotten access key can derail that dream overnight. Securing Cloud Operations is a straightforward, step-by-step course that teaches absolute beginners how to set up, strengthen, and review a small web stack on AWS, Azure, or Google Cloud using only free-tier services and simple checklists. 

You will learn why service models (IaaS, PaaS, SaaS) matter, how the shared-responsibility model works, and which one-click security features offer instant protection. By the end, you’ll have tested your VM against the CIS Benchmark, exported evidence for an audit folder, and walked away with a printable ten-control checklist you can apply to every future project. 

Skills You Will Gain

Cloud Security
Cloud Operations
IaaS security
PaaS security
SaaS security

Course Includes

STUDENTS*
RECOMMEND*

This course includes:

  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

Learning Outcomes (At the end of this program, you will be able to...)

  • Differentiate the security responsibilities of the cloud provider vs. the customer across IaaS, PaaS, and SaaS service models. 
  • Configure identity- and network-based controls—such as IAM roles, security groups, and VPC firewalls—across AWS, Azure, and Google Cloud to enforce least-privilege access. 
  • Deploy and operationalize cloud-native security services (e.g., AWS GuardDuty, Azure Defender, Google Cloud SCC) to detect threats and manage incident response workflows. 
  • Map application and infrastructure workloads to compliance frameworks including CIS Benchmarks, ISO/IEC 27001, and the NIST Cybersecurity Framework, producing evidence artifacts for audits. 

Prerequisites

Networking & virtualization basics, familiarity with at least one public cloud platform

Who Should Attend

Cloud engineers, DevOps engineers, Security analysts, Solution architects 

Curriculum

Explore the comprehensive, hands-on curriculum designed to build your expertise step by step.

Meet Your Expert Instructors

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.