In today’s digital landscape, securing cloud environments and managing vulnerabilities are critical to safeguarding data and systems. This course provides a deep dive into cloud security principles, resiliency strategies, and vulnerability management to help you build a strong cybersecurity foundation. You’ll explore key security frameworks, cloud deployment models, and risk mitigation techniques while learning to assess and strengthen security postures.
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/fa/3b9b5304c24cf4aa64054631ee946c/360-360-square.png?auto=format%2Ccompress&dpr=1&w=28&h=28)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/1a4589dccee10648821b7ea23e5fca9a.png?auto=format%2Ccompress&dpr=1&q=80)
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/c7/391d0e5f6a4d648dc4f754c5898df7/2.png?auto=format%2Ccompress&dpr=1&h=45)
Cloud Security, Resiliency, and Vulnerability Management
This course is part of CompTIA Security+ SY0-701 Full Training Guide Specialization
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Implement cloud security best practices, including identity management and Zero Trust models.
Develop resilient security strategies, including redundancy, backup planning, and defense-in-depth.
Identify and mitigate vulnerabilities, including XSS, SQL injection, and misconfigurations.
Secure endpoints, monitor network activity, and apply security benchmarks effectively.
Details to know
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/31ebcba3851b87d1d8609abf15d0ff7e.png?auto=format%2Ccompress&dpr=1&w=24&h=24)
Add to your LinkedIn profile
February 2025
6 assignments
See how employees at top companies are mastering in-demand skills
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=320)
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/a7c5400e51272c78b710ce9b56fd3178.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=562)
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=259)
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=333)
There are 5 modules in this course
In this module, we will explore secure cloud network architecture, examining deployment models, security solutions, and automation strategies. We will also dive into Zero Trust principles, Infrastructure as Code, and the security challenges of embedded systems, IoT, and Industrial Control Systems.
What's included
8 videos2 readings1 assignment
In this module, we will examine key resiliency and site security strategies, including backup methods, cybersecurity resilience, and redundancy planning. We will also explore defense-in-depth techniques and physical security controls to safeguard critical infrastructure.
What's included
9 videos1 assignment
In this module, we will dive into vulnerability management, covering techniques for discovery, analysis, and remediation. We will explore common attack methods, weak configurations, and the role of threat intelligence in proactive security.
What's included
12 videos1 assignment
In this module, we will evaluate network security capabilities, covering secure configurations, Wi-Fi authentication, and monitoring strategies. We will also explore web filtering techniques to enhance security and enforce compliance.
What's included
6 videos1 assignment
In this module, we will explore endpoint security strategies, including device protection, segmentation, and mobile security management. We will also discuss secure design principles to ensure robust security across endpoints and applications.
What's included
7 videos1 reading2 assignments
Instructor
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Offered by
Recommended if you're interested in Computer Security and Networks
Why people choose Coursera for their career
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Felipe_Moitta.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Jennifer_John.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Larry_Tao_Wang_1.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Chaitanya_Anand.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
New to Computer Security and Networks? Start here.
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=120)
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.