Skip to main content
Back to CoursesCareer TrackCybersecurity

Cloud Security & DevSecOps Course in Nepal — AWS Security, Zero Trust Architecture & Secure CI/CD

Harden cloud identities, delivery pipelines, and detection workflows with disciplined cloud security practice.

Duration
10 weeks
Batch Size
Max 10
Format
Online + Offline
Level
advanced

Your Learning Schedule

Mon-Fri live classes

2 hrs live class/day + 2 hrs self-study at home (required).

Sunday Open Lab

Classrooms and labs stay fully open all day. Come study, pair-program, and build.

Daily commitment

Minimum 2 hrs focused practice beyond class at home. This is what builds real mastery.

Core tech & tools
AWS SecurityIAMCloudTrailGuardDutySemgrepTrivyFalcoCheckov

AWS IAM, logging, secrets, and cloud-hardening workflows with stronger architectural discipline

Controlled cloud attack-path review across metadata risk, misconfiguration, and privilege boundaries

Identity and federation security across AWS, Entra ID awareness, OAuth, and SAML

Tuition & Support
Initial batch offer

Mar 1, 2026 – Dec 31, 2099

NPR 35,000Flexible options available
NPR 29,750

Save NPR 5,250 on this course right now.

Live interactive sessions with trainers

Small-batch feedback on your practical work

Course materials, recordings, and lab support

Personalized guidance after Saarathi Gate on pacing, practice focus, and support

Upcoming Batch

Enrolling Now

Limited seats. Final class timing is confirmed within 48 hours based on availability.

About this Course

This course is built for learners who already have security foundations and now need stronger cloud-security judgment. The focus is not only on cloud attack paths. It is on building safer IAM boundaries, using logs and controls well, validating findings carefully, and connecting security work to real delivery systems.

Students practice cloud hardening, controlled attack-path review, identity and federation security, DevSecOps checks, and reporting. The outcome is a more dependable cloud-security workflow, not a pile of disconnected security tools.

AWS IAM, logging, secrets, and cloud-hardening workflows with stronger architectural discipline

Controlled cloud attack-path review across metadata risk, misconfiguration, and privilege boundaries

Identity and federation security across AWS, Entra ID awareness, OAuth, and SAML

DevSecOps checks across SAST, dependency, container, IaC, and runtime review

Capstone reporting that connects cloud findings to remediation and delivery teams

Capstone spotlight

SecureRetail AWS Security Architecture

Final build focus

> Note: Project themes may evolve each batch, but every learner still completes one trainer-approved final project from the approved pool. Smaller guided exercises can happen during the course, but the public completion standard stays anchored to one polished final outcome.

  • Implement IAM policies and security groups following least-privilege
  • Configure GuardDuty threat detection and CloudTrail audit logging
  • Build one DevSecOps pipeline with security scanning (SAST/SCA)
  • Create security monitoring dashboard

Why This Course?

Global Context: Cloud adoption keeps increasing the need for stronger identities, hardened pipelines, detection workflows, and safer defaults. Teams need engineers who can make security part of delivery instead of treating it as a last-step audit.

Nepal Context: As banking, fintech, government platforms, and product teams continue using cloud infrastructure, the need for secure IAM, logging, incident response readiness, and pipeline security keeps growing. The gap is often in engineers who can connect architecture, detection, and remediation in one flow.

Your Opportunity: This course positions you for cloud security, DevSecOps, and security-platform roles that reward clearer IAM judgment, practical detection habits, and more usable security automation.

The strongest cloud-security engineers are rarely the ones making the loudest claims. They are the ones who can review a permission boundary, explain an attack path, validate a finding, and recommend a fix that an engineering team will actually adopt.

Better IAM and safer defaults prevent avoidable incidents

Cloud misconfigurations and weak identity boundaries remain common

Prevention and detection must fit engineering workflows

Security expectations keep rising across delivery teams

IAM, federation, and access review discipline are crucial

Identity keeps becoming the main control plane

DevSecOps skills matter most when checks are accurate and usable

Automation can reduce risk or create noise

How Saarathi Gate shapes your learning plan

Saarathi Gate is a diagnostic, not a pass-or-fail exam. It helps us understand your current skill level, how you learn best, where you are already strong, and where you need extra support before the batch begins.

Before the batch starts

You complete Saarathi Gate so we can understand your current skill level, how you learn best, your strengths, and the support you may need before classes begin.

During the course

Trainers use that diagnostic profile to guide pacing, practice focus, feedback, and the kind of support that helps you learn best.

Certification and proof of work

Certification for Cloud Security & DevSecOps Course in Nepal — AWS Security, Zero Trust Architecture & Secure CI/CD depends on attendance, required coursework, trainer review, and the practical work described in the micro-syllabus and full syllabus.

Curriculum

A structured journey to mastery

WeekFocus AreaWhat You'll Master
W1Shared Responsibility, IAM & GuardrailsCloud security mindset, shared responsibility, IAM foundations, boundary design, logging goals, and advanced-course expectations
W2Logging, Secrets & Security ServicesCloudTrail, GuardDuty, Security Hub, secrets management, KMS, Config rules, and practical cloud-hardening review

Where this course can lead

These are examples of roles, responsibilities, or directions this course can help you grow toward.

Possible next roles
Cloud Security Analyst
Cloud Security Engineer
DevSecOps / Security Platform Engineer
Senior Cloud Security Engineer / Security Architect

Frequently Asked Questions

Completion of Ethical Hacking & Network Security (TR-04) or equivalent is required. You should already be comfortable with Burp Suite, Nmap, Linux logs and services, and core OWASP Top 10 thinking. Prior AWS or Azure exposure is strongly helpful. Before Day 1, review IAM basics, HTTP request flow, and Linux access-control concepts, then complete the advanced readiness review. All applicants complete Saarathi Gate Assessment before enrollment. This is not a zero-beginner entry course.

Seats are limited

Ready to start your journey?

Complete Saarathi Gate, confirm your level, and secure your seat for the upcoming batch.