In this course, you will learn how to secure cloud environments using industry-standard platforms like AWS, Azure, and GCP. You'll explore essential security concepts and strategies to ensure that your cloud infrastructure remains safe from evolving threats.

推荐体验
推荐体验
初级
Ideal for IT professionals and cloud engineers with prior knowledge of cloud services.
推荐体验
推荐体验
初级
Ideal for IT professionals and cloud engineers with prior knowledge of cloud services.
您将学到什么
Learn to protect compute, storage, and networking services across AWS, Azure, and GCP
Implement IAM policies and best practices to control user access securely in cloud environments
Master encryption techniques to ensure data privacy and security across cloud platforms
Understand and apply cloud security compliance frameworks, ensuring your cloud infrastructure meets industry standards
您将获得的技能
要了解的详细信息

添加到您的领英档案
November 2025
17 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有17个模块
In this section, we explore cloud security best practices across AWS, Azure, and GCP, emphasizing secure environment design and the shared responsibility model. We cover practical applications of command-line tools like AWS CLI, Azure CLI, and Google Cloud SDK to implement security frameworks effectively.
涵盖的内容
2个视频3篇阅读材料1个作业
2个视频• 总计2分钟
- Course Overview• 1分钟
- Introduction to Cloud Security - Overview Video• 1分钟
3篇阅读材料• 总计60分钟
- Introduction• 10分钟
- What Is a Cloud Service?• 20分钟
- What Is the Shared Responsibility Model?• 30分钟
1个作业• 总计10分钟
- Cloud Security Fundamentals• 10分钟
In this section, we explore securing virtual machines across major cloud platforms, focusing on best practices for authentication, network access, patch management, and backups. Key concepts include implementing secure login methods using SDKs, analyzing network access controls, and applying platform-specific security strategies for AWS EC2, Azure VMs, and GCE.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Compute Services - Virtual Machines - Overview Video• 1分钟
3篇阅读材料• 总计80分钟
- Introduction• 30分钟
- Amazon EC2• 20分钟
- Best Practices for Conducting Patch Management• 30分钟
1个作业• 总计10分钟
- Securing Compute Services in the Cloud• 10分钟
In this section, we explore best practices for securing Kubernetes and containerized workloads, focusing on identity and access management, network policies, and auditing strategies. The content emphasizes practical implementation of security measures across cloud platforms like Amazon EKS, AKS, and GKE, ensuring robust protection for modern cloud-native applications.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Compute Services - Containers and Kubernetes - Overview Video• 1分钟
7篇阅读材料• 总计170分钟
- Introduction• 30分钟
- Best Practices for Identity and Access Management in Kubernetes• 20分钟
- Best Practices for Data Protection in Kubernetes• 30分钟
- Best Practices for Auditing and Security Monitoring in Kubernetes• 30分钟
- Implementing Secure Configuration in Kubernetes• 10分钟
- Securing non-Kubernetes workloads• 20分钟
- Securing Azure Container Apps• 30分钟
1个作业• 总计10分钟
- Securing Compute Services in Kubernetes and Containers• 10分钟
In this section, we explore secure deployment and management of serverless computing and function as a service (FaaS) across AWS, Azure, and GCP. We focus on IAM policies, data protection strategies, and auditing tools to ensure compliance and security in cloud-based functions.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Compute Services - Serverless and FaaS - Overview Video• 1分钟
4篇阅读材料• 总计110分钟
- Introduction• 20分钟
- AWS Lambda• 30分钟
- Google Cloud Run Functions• 30分钟
- Best Practices for Auditing and Security Monitoring in FaaS• 30分钟
1个作业• 总计10分钟
- Securing Compute Services in Serverless Architectures• 10分钟
In this section, we explore securing cloud storage services including object, block, file, and Container Storage Interface (CSI) storage. Key concepts include implementing secure object storage solutions using S3, Blob Storage, and GCS, designing block storage security with Amazon EBS, Azure Disks, and GPD, and analyzing file storage best practices for EFS, FSx, and Filestore. The section emphasizes practical strategies for protecting sensitive data through IAM, data protection, and auditing techniques across major cloud platforms.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Storage Services - Overview Video• 1分钟
7篇阅读材料• 总计190分钟
- Introduction• 30分钟
- Best Practices for Data Protection in Object Storage• 30分钟
- Google Cloud Storage• 30分钟
- Securing File Storage• 20分钟
- Amazon EFS• 30分钟
- Best Practices for Auditing and Security Monitoring in File Storage• 20分钟
- Securing the Container Storage Interface• 30分钟
1个作业• 总计10分钟
- Securing Cloud Storage Solutions• 10分钟
In this section, we explore securing virtual networking using AWS VPC, Azure VNet, and Google Cloud VPC, along with best practices for monitoring and configuring network ACLs and security groups. We also cover DNS security, including mitigating DNS spoofing and DDoS attacks, and securing DNS services like Route 53 and Azure DNS. The section addresses securing VPN services across major cloud providers and introduces Zero Trust frameworks such as AWS Verified Access and BeyondCorp, emphasizing secure access control and client-side components.
涵盖的内容
1个视频8篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Networking Services - Part 1 - Overview Video• 1分钟
8篇阅读材料• 总计190分钟
- Introduction• 30分钟
- General Best Practices for Securing Virtual Networks• 20分钟
- Google Cloud VPC• 20分钟
- Securing DNS services• 30分钟
- Securing VPN Services• 10分钟
- Securing AWS Client VPN• 30分钟
- Securing Zero Trust Services• 20分钟
- Securing Global Secure Access• 30分钟
1个作业• 总计10分钟
- Securing Networking Services in the Cloud• 10分钟
In this section, we explore securing web applications using DDoS protection services like AWS Shield and Azure DDoS Protection, alongside WAF services such as AWS WAF and Google Cloud Armor. We analyze strategies for mitigating network-layer and application-layer attacks, emphasizing practical implementation and best practices for cloud-based security solutions.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Networking Services - Part 2 - Overview Video• 1分钟
4篇阅读材料• 总计80分钟
- Introduction• 20分钟
- Using Azure DDoS Protection• 20分钟
- Using WAF Services• 20分钟
- Using Azure Front Door• 20分钟
1个作业• 总计10分钟
- Securing Networking Services and DDoS Protection• 10分钟
In this section, we explore securing generative AI (GenAI) workloads using cloud platforms like AWS, Azure, and GCP, focusing on identity and access management (IAM), data protection, and auditing. We examine best practices for deploying GenAI services, including Amazon Bedrock, Azure OpenAI, and Google Vertex AI, to ensure compliance, reduce risks, and maintain ethical standards in AI applications.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频• 总计1分钟
- Securing Generative AI Services - Overview Video• 1分钟
4篇阅读材料• 总计70分钟
- Introduction• 20分钟
- High-Level Best Practices for Securing GenAI Applications• 30分钟
- Best Practices for Data Protection in GenAI Services• 10分钟
- Best Practices for Auditing and Security Monitoring in GenAI Services• 10分钟
1个作业• 总计10分钟
- Securing Generative AI in the Cloud• 10分钟
In this section, we explore IAM strategies for cloud environments, focusing on securing directory services with SAML and OAuth, and evaluating IAM policies in GCP and AWS. The content emphasizes practical applications of identity management, including role-based access control and best practices for securing cloud-based IAM services across platforms like AWS, Microsoft Entra ID, and GCP.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频• 总计1分钟
- Effective Strategies for Implementing IAM Solutions - Overview Video• 1分钟
3篇阅读材料• 总计90分钟
- Introduction• 30分钟
- Securing Microsoft Entra ID• 30分钟
- Securing IAM in GCP• 30分钟
1个作业• 总计10分钟
- Identity and Access Management Implementation Strategies• 10分钟
In this section, we explore the implementation of audit trails using AWS CloudTrail, Azure Monitor, and Google Cloud Audit Logs to track and analyze cloud activity. We also examine threat detection and response strategies with tools like Amazon GuardDuty, Microsoft Defender for Cloud, and Google Security Command Center, alongside managing cloud-native SIEM solutions such as Microsoft Sentinel and Google Security Operations to enhance security and compliance in cloud environments.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频• 总计1分钟
- Auditing and Threat Management in Cloud Environments - Overview Video• 1分钟
6篇阅读材料• 总计170分钟
- Introduction• 30分钟
- Azure Monitor• 30分钟
- AWS Support• 30分钟
- Conducting Threat Detection and Response• 20分钟
- Microsoft Defender for Cloud• 30分钟
- Managing Cloud-Native SIEM• 30分钟
1个作业• 总计10分钟
- Cloud Security and Threat Management Fundamentals• 10分钟
In this section, we explore encryption techniques for cloud security, focusing on symmetric and asymmetric encryption, key management services (KMSs), and secure data transmission. We cover practical implementations such as AES 256, AWS KMS, Azure Key Vault, TLS 1.3, and IPSec, emphasizing best practices for encryption in transit, at rest, and in use. The content highlights the importance of securing sensitive data, reducing breach risks, and leveraging cloud-native encryption tools for compliance and confidentiality.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频• 总计1分钟
- Applying Encryption in Cloud Services - Overview Video• 1分钟
5篇阅读材料• 总计110分钟
- Introduction• 10分钟
- Symmetric Encryption• 10分钟
- Best Practices for Using Encryption in Transit• 30分钟
- Best Practices for Deploying Secrets Management Services• 30分钟
- Encryption in Use• 30分钟
1个作业• 总计10分钟
- Securing Sensitive Data in the Cloud• 10分钟
In this section, we explore strategies for detecting and mitigating common cloud security threats, including data breaches, misconfigurations, and insecure APIs. Key concepts include IAM best practices, secure key management, and the use of frameworks like MITRE ATT&CK to enhance cloud security posture.
涵盖的内容
1个视频8篇阅读材料1个作业
1个视频• 总计1分钟
- Understanding Common Security Threats to Cloud Services - Overview Video• 1分钟
8篇阅读材料• 总计120分钟
- Introduction• 10分钟
- Best Practices for Detecting and Mitigating Data Breaches in Cloud Environments• 10分钟
- Misconfigurations in Cloud Services• 10分钟
- Insufficient IAM, Secrets, and Key Management• 10分钟
- Account Hijacking in Cloud Services• 20分钟
- Insider Threats in Cloud Services• 20分钟
- Insecure APIs in Cloud Services• 20分钟
- The Abuse of Cloud Services• 20分钟
1个作业• 总计10分钟
- Security Fundamentals in Cloud Computing• 10分钟
In this section, we explore evaluating cloud service providers through risk assessments, contracts, and audits to ensure security and compliance. Key concepts include using SOC 2 Type 2 reports for control evaluation, designing SLAs for incident response, and conducting annual penetration testing for cloud systems.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频• 总计1分钟
- Engaging with Cloud Providers - Overview Video• 1分钟
4篇阅读材料• 总计80分钟
- Introduction• 10分钟
- Data Privacy and Data Sovereignty• 30分钟
- What Are SOC Reports• 20分钟
- Conducting Penetration Testing in Cloud Environments• 20分钟
1个作业• 总计10分钟
- Cloud Provider Engagement and Security Fundamentals• 10分钟
In this section, we explore hybrid cloud strategies, focusing on integrating on-premises and cloud environments using tools like Azure Front Door, site-to-site VPN, and SQL databases. We emphasize identity management with Microsoft Entra Domain Services and discuss secure network architectures, including AWS and Azure connectivity options. The section highlights best practices for centralized identity control, auditing, and securing hybrid environments with AWS IAM, Azure AD, and GCP solutions. It also covers practical applications in storage, computing, and disaster recovery, ensuring consistent operations and security across hybrid infrastructures.
涵盖的内容
1个视频8篇阅读材料1个作业
1个视频• 总计1分钟
- Managing Hybrid Clouds - Overview Video• 1分钟
8篇阅读材料• 总计190分钟
- Introduction• 30分钟
- Best Practices for Identity in a Hybrid Environment• 20分钟
- Managing Identity Over Hybrid Azure Environments• 20分钟
- Network Architecture for Hybrid Cloud Environments• 20分钟
- Connecting the On-Premises Environment to Azure• 20分钟
- Storage Services for Hybrid Cloud Environments• 20分钟
- Connecting to Storage Services Over GCP Hybrid Environments• 30分钟
- Using Computing Services Over GCP Hybrid Environments• 30分钟
1个作业• 总计10分钟
- Hybrid Cloud Security and Management Fundamentals• 10分钟
In this section, we explore strategies for managing multi-cloud environments using AWS, Azure, and GCP, focusing on cost, security, and compliance. Key concepts include data replication, identity management, encryption in transit and at rest, and cost implications across cloud service providers (CSPs).
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频• 总计1分钟
- Managing Multi-Cloud Environments - Overview Video• 1分钟
7篇阅读材料• 总计170分钟
- Introduction• 30分钟
- Identity Management• 30分钟
- Managing Identity in AWS Over Multi-Cloud Environments• 20分钟
- Managing Identity in Azure Over Multi-Cloud Environments• 30分钟
- Network Architecture for Multi-Cloud Environments• 20分钟
- Data Security in Multi-Cloud Environments• 20分钟
- CIEM• 20分钟
1个作业• 总计10分钟
- Managing Security and Access in Multi-Cloud Environments• 10分钟
In this section, we explore the cultural and technical aspects of integrating security into DevOps workflows through DevSecOps. We examine best practices for people, processes, and technology, including secure CI/CD pipeline implementation and cloud-based security tools like Amazon Inspector and GitHub Copilot.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频• 总计1分钟
- Implementing DevSecOps - Overview Video• 1分钟
3篇阅读材料• 总计60分钟
- Introduction• 30分钟
- Implementing Security as part of the test phase• 10分钟
- DevSecOps Best Practices Technology• 20分钟
1个作业• 总计10分钟
- DevSecOps Fundamentals• 10分钟
In this section, we explore managing security and governance across multi-cloud environments using tools like AWS SCPs, Azure Policy, and Terraform. We focus on automation through infrastructure as code (IaC) and policy as code (PaC) to ensure consistency, compliance, and scalability in large-scale cloud operations.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频• 总计1分钟
- Security in Large-Scale Environments - Overview Video• 1分钟
5篇阅读材料• 总计120分钟
- Introduction• 20分钟
- AWS Organizations• 20分钟
- Governance in Azure• 20分钟
- Governance in Google Cloud• 30分钟
- AWS SCPs• 30分钟
1个作业• 总计10分钟
- Cloud Security and Governance Fundamentals• 10分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
从 Security 浏览更多内容
EEdureka
课程
IIllinois Tech
课程
IIllinois Tech
课程
PPalo Alto Networks
课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

