Menu

Specialisation in Cloud Environment Security

Live online classes

October 2025

3 months

Prior knowledge is required

We prepare you for certification

Study plan

Security Fundamentals in Cloud Environments

Conceptual foundations, liability models, threats and good practice in safe design.

  • Introduction to Cloud Security
    • Fundamental concepts of computer security
    • Shared responsibility model
    • Differences between on-premise and cloud security
    • Top threats in cloud environments
  • Principles of Safe Design
    • Zero Trust Architecture
    • Defence in Depth
    • Principle of Least Privilege (Principle of Least Privilege)
    • Segmentation and micro-segmentation
Security in Microsoft Azure

Coverage of identity management, data protection, network security and incident response in Azure.

  • Azure Security Fundamentals
    • Azure Security Center and Microsoft Defender for Cloud
    • Security and compliance policies
    • Azure Security Benchmark
  • Identity and Access in Azure
    • Azure Active Directory
    • Multi-factor authentication (MFA)
    • Privileged Identity Management (PIM)
    • Conditional access policies
  • Data Protection in Azure
    • Azure Key Vault
    • Encryption of data at rest and data in transit
    • Azure Information Protection
  • Azure Network Security
    • Azure Firewall
    • Network Security Groups (NSG)
    • DDoS protection in Azure
    • Azure Private Link
  • Incident Monitoring and Response
    • Azure Sentinel
    • Log Analytics
    • Security monitoring and alerts
    • Response automation
Security on Amazon Web Services (AWS)

Practical and strategic approach to securing infrastructure on AWS, from IAM to advanced monitoring.

  • AWS Security Fundamentals
    • AWS Shared Responsibility Model
    • AWS Security Hub
    • AWS Config and AWS CloudTrail
  • Identity and Access on AWS
    • AWS Identity and Access Management (IAM)
    • AWS Organisations
    • AWS Single Sign-On (SSO)
  • Data Protection on AWS
    • AWS Key Management Service (KMS)
    • AWS Certificate Manager
    • Amazon Macie
  • Network Security on AWS
    • Security groups and NACLs
    • AWS WAF and AWS Shield
    • Amazon VPC and Transit Gateway
    • AWS Network Firewall
  • Incident Monitoring and Response
    • Amazon GuardDuty
    • AWS Detective
    • AWS Security Hub
    • AWS Systems Manager
Google Cloud Platform (GCP) Security

It addresses the main defence and monitoring mechanisms in the Google cloud, with an emphasis on secure design.

  • GCP Security Fundamentals
    • Google Cloud Security Command Center
    • Google Cloud Armor
    • GCP security model
  • Identity and Access in GCP
    • Identity and Access Management (IAM)
    • Resource hierarchy and permission inheritance
    • Cloud Identity
  • Data Protection at GCP
    • Cloud Key Management Service
    • Secret Manager
    • Encryption by Default (Encryption by Default)
  • Network Security in GCP
    • VPC Service Controls
    • Cloud Firewall
    • Cloud IDS/IPS
    • Cloud NAT
  • Incident Monitoring and Response
    • Cloud Logging and Cloud Monitoring
    • Cloud Audit Logs
    • Security Health Analytics
    • Event Threat Detection
Multi-Cloud Security and Regulatory Compliance

Strategies for hybrid environments and compliance with global standards such as ISO, GDPR and PCI DSS.

  • Multi-Cloud Security Strategies
    • Centralised identity management
    • Consistency in security policies
    • Cloud Security Posture Management (CSPM)
    • Multi-factor authentication and additional measures
  • Regulatory Compliance in the Cloud
    • Standards: ISO/IEC 27001, 27017, 27018
    • SOC Reports 1, 2 and 3
    • GDPR, HIPAA, PCI DSS regulations
    • Cloud provider-specific controls
Incident Response and Crisis Management

Preparedness for security incidents: planning, attack simulation, automation and use of tools such as PowerShell and command line.

  • Azure Labs
    • Defence in depth implementation
    • Configuring Azure Sentinel
    • Hardening of Azure resources (hardening)
    • Data Security Lab: Backup and Disaster Recovery
  • Labs at AWS
    • Implementation of security controls in AWS
    • GuardDuty incident response
    • Secure architecture design on AWS
  • Laboratories in GCP
    • Configuring the Security Command Center
    • Implementation of VPC Service Controls
    • Advanced auditing and logging
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.Download the brochure here
ElizaCareer opportunities

Cloud Security Specialist (Cloud Security Engineer) | Secure Cloud Solutions Architect | Multicloud Security Consultant | Cybersecurity Analyst in Cloud Environments

Certifications
Cisco Certified CCST Cybersecurity
Cisco Certified CCST Networking
IT Specialist Cybersecurity
Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900
IMMUNE Technology Institute - Specialisation in Cloud Environment Security

Certification training

With this programme you will acquire the necessary skills to work in a professional environment. In order for you to be able to demonstrate this, IMMUNE prepares you to be certified in:

Cisco Certified CCST Cybersecurity

Cisco Certified CCST Networking

IT Specialist Cybersecurity

Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900

Specialisation in Cloud Environment Security

The Cloud Security Specialisation is an advanced three-month programme designed to train professionals capable of securing, managing and auditing cloud technology infrastructures. Through a multi-cloud and hands-on approach, key tools and methodologies for securing platforms such as Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP) are explored, as well as incident response strategies, regulatory compliance and best practices in hybrid architectures.

Prerequisites
  • Successful completion of the IMMUNE Master's Degree in Cybersecurity.

Ó

  • Cybersecurity or IT experience: At least 2-3 years of experience in roles related to information security, system or network administration.
  • Previous experience in cloud environments or having completed a master's degree or bootcamp in cloud computing or cybersecurity.
Program aims
  • Understand the fundamental principles of cloud security and the shared responsibility model.
  • Apply secure design strategies such as Zero Trust, defence in depth and least privilege.
  • Implement data protection, identity, network and monitoring measures in Azure, AWS and GCP.
  • Manage security incidents using SIEM tools, automation and attack simulations.
  • Ensure compliance with international regulations and standards such as ISO 27001, GDPR and PCI DSS.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

Learning paths

With IDEIA, we design customized learning paths, tailored to your experience and goals. This ensures efficient progress, focused on what you truly need.

Our learning paths guide you from beginner level to becoming an expert in your chosen field. They are structured yet flexible routes, paced to suit you, so you can reach your full personal and professional potential.

Learning paths
CybertalentIncibe

Cybertalent

Do you have a cybersecurity-related project that you would like to develop? Have you identified a cybersecurity need? Do you need funding to launch your company? IMMUNE, in collaboration with INCIBE, is developing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.

Find out more
Cybertalent map
Seedbed Incubator
Business Accelerator
Catchment
Phase 1: Recruitment / Ideation
Get ready through our events
Incubation
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Acceleration
Phase 3: Acceleration
Grow your business with the support of Incibe
Funded by the European Union NextGenerationEUSpanish GovernmentRecovery, Transformation and Resilience PlanIncibeIncibeIMMUNE Technology Institute

Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Financing

Full payment

If you pay in one instalment you will benefit from a 20% discount.

12 interest-free instalments

Sequra

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Sequra

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

Fundae

FAQs

What certification or qualification will I receive on completion of the course?

Once you complete and pass the programme you will receive a diploma issued by IMMUNE Technology Institute in a digital format verifiable through blockchain technology.

Is this programme for me?

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application

3. Academic committee

4. Enrollment

2. Personal interview

Request information

Visit our Campus in Madrid and discover everything about our programmes

  • Personalised guidance Monday to Friday.
  • Intake now open for March, September and October.

Designed to replicate an ecosystem of start-ups and tech companies, we’ve created a slice of Silicon Valley in the heart of Madrid.

Find out more
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio