Master the critical skills for securing cloud infrastructure through systematic analysis, proactive policy creation, and comprehensive compliance evaluation. This course empowers you to become a guardian of cloud security by teaching you to detect suspicious privilege escalations in IAM audit logs, automate security governance through infrastructure-as-code policies, and assess organizational controls against industry standards like SOC 2 and NIST.

Analyze, Create, and Evaluate Cloud Security

Analyze, Create, and Evaluate Cloud Security
This course is part of AI Systems Reliability & Security Specialization

Instructor: Hurix Digital
Access provided by Abu Dhabi National Oil Company
Recommended experience
What you'll learn
Security monitoring relies on clear behavioral baselines to separate normal admin activity from anomalies that may signal security threats.
Infrastructure-as-code enables proactive security governance, preventing vulnerabilities at scale more effectively than reactive incident response.
Compliance frameworks support structured risk management and must be continuously reviewed to adapt to evolving security threats.
Automated policy enforcement in CI/CD pipelines builds scalable, sustainable security practices that grow with the organization.
Skills you'll gain
- Network Security
- Cyber Security Policies
- NIST 800-53
- Auditing
- Vulnerability Management
- Security Information and Event Management (SIEM)
- Encryption
- Identity and Access Management
- Cloud Computing
- Security Controls
- Continuous Monitoring
- DevSecOps
- AWS Identity and Access Management (IAM)
- Cloud Security
- Threat Detection
- Authorization (Computing)
- Cyber Security Assessment
- Infrastructure as Code (IaC)
Details to know

Add to your LinkedIn profile
January 2026
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
Learners will master the critical skill of detecting security threats through systematic IAM audit log analysis, enabling them to protect cloud infrastructure from privilege escalation attacks.
What's included
3 videos1 reading1 assignment
Learners will develop the critical skill of embedding security requirements directly into infrastructure deployment processes, ensuring consistent policy enforcement at scale.
What's included
3 videos2 readings2 assignments
Learners will develop comprehensive skills in security controls evaluation by systematically assessing organizational security practices against industry standards like SOC 2 and NIST, identifying compliance gaps, and ensuring regulatory adherence for AI/ML environments.
What's included
2 videos1 reading3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Information Technology

Illinois Tech

Edureka

Illinois Tech
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.


