White Hacker

As cloud computing has deeply changed the way we host data, apps, and services, IT teams need to cater to the big cloud-revolution. Our new cloud security fundamentals training program aims at getting your most loyal and trusted ICT employees on-premise for the big cloud leap forward and this in only 20 days! As part of this ESF project BeCode developed a number of specific modules for ICT employees of companies who want to study the Cybersecurity aspects of their job.


A project supported by

Target audience

This training is developed for freelancers and employees in the IT operations and development department. Nevertheless, it can also be used to reskill jobseekers or people with jobs at risk with an interest in IT to reach a job-entry level.

At the end of this learning path, the participants should be able to build a complete cloud infrastructure allowing secure data sharing and management. 

Training program

Get your IT team ready for the big cloud leep forward in only 20 days time! At the end of this training they will be able to apply the fundamentals of secure cloud technologies on remote infrastructures using providers like AWS or Azure and their services. Discover here how we’ll prepare your employee(s) for their new adventure.

1. Identity & access


Identity and access management is the foundation of system administration. We’ll dive into the differences between a classic on-premise infrastructure and cloud infrastructures such as Azure and AWS.


  • Identify uniquely a user.
  • Secure a user connection.
  • Define a role-based access control.

2. logging & monitoring


How to detect a malfunction? How to know if you have been attacked? Monitoring is the answer! In this module, we’ll learn how to monitor and get notified in case of unusual events.


  • Design and implement monitoring.
  • Set-up advanced monitoring.

3. security operations


Guaranteeing security in the cloud can be a challenge! We will see how to secure a cloud environment and how it translates to an on-premise installation.


  • Setup a virtual network.
  • Setup a virtual firewall.
  • Deploy DDOS protection and other vulnerabilities.

4. secure data & apps


Data is capital, so don’t leave it unsecured! In this chapter, we’ll uncover how to protect the main asset, data.


  • Deploy an encryption infrastructure.
  • Setup a key management infrastructure.
  • Design backup procedures.

5. incident response


A CloudOps always need to be prepared for an attack. In this section, we’ll see how to quickly identify an attack and recover from it.


  • Identify the exact scope of an incident.
  • Design an incident response for a full recovery.


  • Strong motivation
  • Self-learner
  • Problem-solving mindset
  • A computer with admin access
  • An admin cloud subscription to Azure or AWS
  • Having the will to learn by doing

Contact us

Are you interested in gaining access to the training material or in following the trajectory? Don’t hesitate to contact us.

Houria Toulni

Houria Toulni

Contact for operational questions