This document outlines a learning process focused on understanding cybersecurity challenges within the context of cloud computing. It delves into the complexities of security responsibility, real-time monitoring, protective behavioral systems, and common web application attacks. The document also highlights the application of this learning in developing tools for high-security software and games, analyzing research gaps, and protecting data against malicious software. It ultimately demonstrates how this knowledge contributes to a successful career as a cyber specialist within organizations like the Australian Government.