Cybersecurity career intelligence
Get weekly cybersecurity career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D. · Cybersecurity career intelligence · Est. 2024
Primary-source-grounded cybersecurity course
A primary-source-grounded six-module path into cloud security engineer and architect roles: shared responsibility, IAM, network segmentation, container security, cloud-native detection, and the career ladder.
Cloud Security Fundamentals is a 6-module cybersecurity course for security engineers, IT generalists, and DevOps practitioners targeting a cloud security engineer or cloud security architect role across AWS, Azure, and Google Cloud. Every module is grounded in NIST Special Publications and the official Well-Architected security pillars rather than vendor marketing. Topics include the shared responsibility model from NIST SP 800-145 (Mell & Grance 2011), IAM design for cloud-scale blast radii using NIST SP 800-210 (Chandramouli & Iorga 2020), microservices and service-mesh security per NIST SP 800-204 (Chandramouli 2019) and 800-204B (2022), container hardening per NIST SP 800-190 (Souppaya, Morello & Scarfone 2017), and zero-trust architecture per NIST SP 800-207 (Rose et al. 2020). The course is for adults committing 8 to 10 weeks of focused study before sitting CCSP, AWS Security Specialty, or Microsoft SC-100. Designed by Julian Calvo, Ed.D. in Applied Learning Sciences (University of Miami, 2026).
The course sequences six modules around the cloud-security operational stack as defined in the NIST cloud-computing reference architecture (Liu et al. 2011, NIST SP 500-292). Each module pairs a primary-source standard with a hands-on prompt: read the standard, apply it to a real cloud configuration, document the security review the way an audit team would expect to see it. The pedagogical structure follows Kolb's experiential learning cycle (1984) and the Dreyfus skill acquisition model (1980): concrete cloud configurations, structured reflection against the standard, abstract conceptualization through the controls catalog, then active experimentation in a free-tier sandbox. Every claim is cited to NIST, CSA, the cloud provider's official documentation, BLS, ISC2, or peer-reviewed research. No vendor white papers without primary-source backing.
Module 01 · 130 min
What the shared-responsibility model actually says, where the seams sit between the cloud provider and the customer, and how the NIST reference architecture organizes the controls catalog you will spend the rest of the course inside.
Module 02 · 150 min
Why IAM is the most-attacked surface in cloud, what NIST SP 800-210 says about access control specifically for cloud systems, and how to design role and policy structures that limit blast radius without paralyzing operations.
Module 03 · 130 min
How to segment a cloud network the way the architecture guides actually intend, what NIST SP 800-207 zero trust changes about the design, and where engineers most often misapply on-prem network thinking.
Module 04 · 140 min
What NIST SP 800-190 says about container security, the four-layer model (image, registry, orchestrator, runtime), and what changes when those containers run on a managed Kubernetes service like EKS, AKS, or GKE.
Module 05 · 130 min
Where the cloud audit log lives in each major provider, what NIST SP 800-92 says about cloud-scale log management, and how to write a detection rule that catches a real cloud attack pattern.
Module 06 · 100 min
What the cloud security engineer and cloud security architect ladder looks like, the credentials hiring managers actually price into the offer, and the portfolio artifacts that move you up the band.
This course is for educational purposes only. It does not guarantee employment, certification pass rates, or salary outcomes. Cloud-platform pricing, services, and feature availability change rapidly; always verify current configuration against the cloud provider's authoritative documentation before applying course content to production systems. NIST and CSA materials cited here are public works; readers should consult primary sources for currency. AWS, Microsoft Azure, and Google Cloud are trademarks of their respective owners; DecipherU is not affiliated with any cloud provider. CCSP and AWS Security Specialty are trademarks of ISC2 and Amazon respectively. DecipherU is not responsible for career, financial, or operational decisions made based on this content.