YouTube channel · 1-on-1 coaching

Become a security architect in a global enterprise.

Two paths. One mission. Three months to master the secure cloud landing zone, then nine more by my side to land the architect role. Or a weekly thread of security videos, tailored from experience in the trenches, for nine euros a month.

Where my mentees work
VinciHermèsBNP ParibasThalesKPMGPwCSiemensAirbusSaint-GobainBouyguesEDFAccenture VinciHermèsBNP ParibasThalesKPMGPwCSiemensAirbusSaint-GobainBouyguesEDFAccenture
👑 Premium · 3 months training + 9 months mentorship · €1,990

Master the cloud landing zone. Become a security architect.

The fastest path I know to a security architect role inside a global enterprise. Three months to learn the landing zone, hands on. Nine more months by my side, to land the job and grow into the role.

The skill · Cloud landing zone
A landing zone is the golden framework large enterprises use to deploy and operate the cloud at scale. Identity, network segmentation, guardrails, policies, governance, billing. Without it, no Fortune 500 lets a single workload run in production. Mastering the landing zone is what separates a cloud user from a cloud architect. For a security professional, this knowledge is inestimable.
// What a landing zone looks like
Workloadswhat actually runs
Web apps APIs Databases AI services
Guardrailswhat blocks bad changes
Policies Compliance Logs · SIEM Cost limits
Networkhow traffic moves
Hub & spoke Segmentation Private endpoints WAF · Firewall
Identitywho can touch what
Tenant RBAC MFA · SSO Conditional access
Foundationthe container hierarchy
Management groups Subscriptions Billing Tagging
Each layer is governed by the one below. Strip the foundation and the whole stack collapses. That is exactly what an attacker tries to do.
Months 1 to 3 · Build it, secure it, ship on it
We design and deploy a landing zone together on Azure. On top of it, you ship a real, enterprise-ready security monitoring application that you build yourself with Claude Code, so that you learn AI coding at the same time. Hands on, weekly 1-on-1 sessions. Once Azure is locked in, I teach you how to replicate the same architectural lens on GCP, AWS, OCI, and Kubernetes. The same lens that big banks, consulting firms, telcos and industrial groups actually use.
Months 4 to 12 · Land the job, grow into the role
A full rewrite of your CV and LinkedIn, calibrated for the architect track. Interview preparation: system design, risk reviews, executive Q&A. Ongoing mentorship while you interview, negotiate, and ramp up in the new role. Any question, any blocker, any architecture review, brought to me.
Who this is for
Engineers with a few years in security or IT, ready to step up to architect. People aiming at large international companies: banks, consulting firms, industrial groups, energy, telecom. The investment is real. The outcome compounds for the rest of your career.
€1,990 · 3 months training + 9 months mentorship
Three slots per cohort. Book a discovery call so we both know it is a fit.
CyberWarrior Program · €9/month

Learn without 1-on-1 coaching.

Premium coaching takes time, budget, and a precise career project. Not everyone needs it to make progress. On YouTube, I publish the theory and the methodology, free and public. Inside CyberWarrior, you get the matching technical demonstration of each concept, on real systems. The price of a coffee per video.

01 · Hacking fundamentals
Reconnaissance, scanning, exploitation, post-exploitation, persistence, exfiltration. The vocabulary and logic of the attacker, before everything else.
02 · The targets attackers love
HR and admin workstations. Active Directory, Microsoft Entra ID, Microsoft 365. Cloud providers: Azure, GCP, AWS, OCI. Kubernetes clusters. Why these targets, and how they chain together.
03 · Controls and their weaknesses
Firewall, antivirus, EDR, SIEM, anti-spam, DLP. What each tool sees, what it misses, how attackers slip past it. You will read a defensive setup the way an attacker reads it.
04 · Attacks on the targets that matter
Phishing with MFA bypass. Fake help desk. Booby-trapped documents. Lateral movement: internal scanning, privilege escalation, persistence. Across AD DS, M365, cloud, Windows, Linux.
05 · Theory on YouTube · demos inside CyberWarrior
On YouTube, the theory and the methodology of each attack and each defense, in the open. Inside CyberWarrior, the matching technical demonstration on real systems, recorded step by step. Same topic, two videos. The why stays public. The how is for members. A continuous thread, so watching becomes reflex and practice becomes habit.
€9/month
The program launches as soon as 100 people have joined the waitlist.
Waitlist

Join the CyberWarrior waitlist.

The program will be shaped by the needs of the people who sign up. The more precise you are about your situation and your goals, the more the program will fit you. A few minutes, and you are on the list.

Your answers are used only to calibrate the program. No spam, no resale.

You are on the list.

Thank you. I will write to you as soon as the program launches, and earlier if a content decision deserves your input. In the meantime, subscribe to the YouTube channel and stop by the Discord.

The coach

The person behind the program.

Fabien Soulis

Fabien Soulis. Multicloud security architect, pentester, incident responder. 15+ years securing global enterprises across North America and Europe.

Inside advanced tech startups like Criteo. Inside worldwide groups like Sodexo and Carrefour. Same craft, different scale.

CISSP. Microsoft Certified Azure Solutions Architect Expert. Instructor at Paris 1 Panthéon-Sorbonne, teaching security architecture. Founder of DMARC-EXPERT.com, a SaaS cybersecurity business with dozens of enterprise clients. Zero major incidents across 150K+ employee environments.

I have analyzed every attack path and designed controls against them. I have written the risk memos and presented them to executives. The program is the format I wish existed when I was learning. Direct, no fluff, what actually works.

Talk to the coach

Four ways to reach me.

A question, a topic to suggest, a blocker in your learning, or a fit conversation about the premium track. Pick the channel that suits you. I read everything.