In this course, you will learn how to secure cloud environments using industry-standard platforms like AWS, Azure, and GCP. You'll explore essential security concepts and strategies to ensure that your cloud infrastructure remains safe from evolving threats.

il reste 3 jours : Bénéficiez d'un coup de pouce pour le Black Friday avec 160 $ de réduction sur plus de 10 000 programmes.


Cloud Security Essentials: AWS, Azure, GCP Protection

Instructeur : Packt - Course Instructors
Inclus avec
Expérience recommandée
Ce que vous apprendrez
Learn to protect compute, storage, and networking services across AWS, Azure, and GCP
Implement IAM policies and best practices to control user access securely in cloud environments
Master encryption techniques to ensure data privacy and security across cloud platforms
Understand and apply cloud security compliance frameworks, ensuring your cloud infrastructure meets industry standards
Compétences que vous acquerrez
- Catégorie : Threat Management
- Catégorie : Network Security
- Catégorie : Zero Trust Network Access
- Catégorie : Infrastructure Security
- Catégorie : Virtual Private Networks (VPN)
- Catégorie : Multi-Cloud
- Catégorie : Azure Active Directory
- Catégorie : Data Security
- Catégorie : Cloud Infrastructure
- Catégorie : IT Security Architecture
- Catégorie : Cloud Platforms
- Catégorie : DevSecOps
- Catégorie : AWS Identity and Access Management (IAM)
- Catégorie : Cloud Computing
- Catégorie : Encryption
- Catégorie : Identity and Access Management
- Catégorie : Google Cloud Platform
- Catégorie : Cloud Security
- Catégorie : Data Encryption Standard
- Catégorie : Amazon S3
Détails à connaître

Ajouter à votre profil LinkedIn
novembre 2025
17 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Il y a 17 modules dans ce cours
In this section, we explore cloud security best practices across AWS, Azure, and GCP, emphasizing secure environment design and the shared responsibility model. We cover practical applications of command-line tools like AWS CLI, Azure CLI, and Google Cloud SDK to implement security frameworks effectively.
Inclus
2 vidéos3 lectures1 devoir
In this section, we explore securing virtual machines across major cloud platforms, focusing on best practices for authentication, network access, patch management, and backups. Key concepts include implementing secure login methods using SDKs, analyzing network access controls, and applying platform-specific security strategies for AWS EC2, Azure VMs, and GCE.
Inclus
1 vidéo3 lectures1 devoir
In this section, we explore best practices for securing Kubernetes and containerized workloads, focusing on identity and access management, network policies, and auditing strategies. The content emphasizes practical implementation of security measures across cloud platforms like Amazon EKS, AKS, and GKE, ensuring robust protection for modern cloud-native applications.
Inclus
1 vidéo7 lectures1 devoir
In this section, we explore secure deployment and management of serverless computing and function as a service (FaaS) across AWS, Azure, and GCP. We focus on IAM policies, data protection strategies, and auditing tools to ensure compliance and security in cloud-based functions.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore securing cloud storage services including object, block, file, and Container Storage Interface (CSI) storage. Key concepts include implementing secure object storage solutions using S3, Blob Storage, and GCS, designing block storage security with Amazon EBS, Azure Disks, and GPD, and analyzing file storage best practices for EFS, FSx, and Filestore. The section emphasizes practical strategies for protecting sensitive data through IAM, data protection, and auditing techniques across major cloud platforms.
Inclus
1 vidéo7 lectures1 devoir
In this section, we explore securing virtual networking using AWS VPC, Azure VNet, and Google Cloud VPC, along with best practices for monitoring and configuring network ACLs and security groups. We also cover DNS security, including mitigating DNS spoofing and DDoS attacks, and securing DNS services like Route 53 and Azure DNS. The section addresses securing VPN services across major cloud providers and introduces Zero Trust frameworks such as AWS Verified Access and BeyondCorp, emphasizing secure access control and client-side components.
Inclus
1 vidéo8 lectures1 devoir
In this section, we explore securing web applications using DDoS protection services like AWS Shield and Azure DDoS Protection, alongside WAF services such as AWS WAF and Google Cloud Armor. We analyze strategies for mitigating network-layer and application-layer attacks, emphasizing practical implementation and best practices for cloud-based security solutions.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore securing generative AI (GenAI) workloads using cloud platforms like AWS, Azure, and GCP, focusing on identity and access management (IAM), data protection, and auditing. We examine best practices for deploying GenAI services, including Amazon Bedrock, Azure OpenAI, and Google Vertex AI, to ensure compliance, reduce risks, and maintain ethical standards in AI applications.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore IAM strategies for cloud environments, focusing on securing directory services with SAML and OAuth, and evaluating IAM policies in GCP and AWS. The content emphasizes practical applications of identity management, including role-based access control and best practices for securing cloud-based IAM services across platforms like AWS, Microsoft Entra ID, and GCP.
Inclus
1 vidéo3 lectures1 devoir
In this section, we explore the implementation of audit trails using AWS CloudTrail, Azure Monitor, and Google Cloud Audit Logs to track and analyze cloud activity. We also examine threat detection and response strategies with tools like Amazon GuardDuty, Microsoft Defender for Cloud, and Google Security Command Center, alongside managing cloud-native SIEM solutions such as Microsoft Sentinel and Google Security Operations to enhance security and compliance in cloud environments.
Inclus
1 vidéo6 lectures1 devoir
In this section, we explore encryption techniques for cloud security, focusing on symmetric and asymmetric encryption, key management services (KMSs), and secure data transmission. We cover practical implementations such as AES 256, AWS KMS, Azure Key Vault, TLS 1.3, and IPSec, emphasizing best practices for encryption in transit, at rest, and in use. The content highlights the importance of securing sensitive data, reducing breach risks, and leveraging cloud-native encryption tools for compliance and confidentiality.
Inclus
1 vidéo5 lectures1 devoir
In this section, we explore strategies for detecting and mitigating common cloud security threats, including data breaches, misconfigurations, and insecure APIs. Key concepts include IAM best practices, secure key management, and the use of frameworks like MITRE ATT&CK to enhance cloud security posture.
Inclus
1 vidéo8 lectures1 devoir
In this section, we explore evaluating cloud service providers through risk assessments, contracts, and audits to ensure security and compliance. Key concepts include using SOC 2 Type 2 reports for control evaluation, designing SLAs for incident response, and conducting annual penetration testing for cloud systems.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore hybrid cloud strategies, focusing on integrating on-premises and cloud environments using tools like Azure Front Door, site-to-site VPN, and SQL databases. We emphasize identity management with Microsoft Entra Domain Services and discuss secure network architectures, including AWS and Azure connectivity options. The section highlights best practices for centralized identity control, auditing, and securing hybrid environments with AWS IAM, Azure AD, and GCP solutions. It also covers practical applications in storage, computing, and disaster recovery, ensuring consistent operations and security across hybrid infrastructures.
Inclus
1 vidéo8 lectures1 devoir
In this section, we explore strategies for managing multi-cloud environments using AWS, Azure, and GCP, focusing on cost, security, and compliance. Key concepts include data replication, identity management, encryption in transit and at rest, and cost implications across cloud service providers (CSPs).
Inclus
1 vidéo7 lectures1 devoir
In this section, we explore the cultural and technical aspects of integrating security into DevOps workflows through DevSecOps. We examine best practices for people, processes, and technology, including secure CI/CD pipeline implementation and cloud-based security tools like Amazon Inspector and GitHub Copilot.
Inclus
1 vidéo3 lectures1 devoir
In this section, we explore managing security and governance across multi-cloud environments using tools like AWS SCPs, Azure Policy, and Terraform. We focus on automation through infrastructure as code (IaC) and policy as code (PaC) to ensure consistency, compliance, and scalability in large-scale cloud operations.
Inclus
1 vidéo5 lectures1 devoir
Instructeur

Offert par
En savoir plus sur Security
Statut : PrévisualisationEdureka
Statut : Essai gratuitIllinois Tech
Statut : PrévisualisationIllinois Tech
Statut : Essai gratuitPalo Alto Networks
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Plus de questions
Aide financière disponible,

