TrueschoTruescho
All Courses
Cloud Application Security
Coursera
Course
Unknown

Cloud Application Security

University of Minnesota

Identify key cloud security threats and assurance methods throughout development, focusing on authentication factors and secure key management.

Unknown4 weeksEnglish2,966 enrolled

About this Course

After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed

What You'll Learn

  • Identify top OWASP cloud application vulnerabilities
  • Apply security assurance methods in development lifecycles
  • Describe virtualization and sandboxing techniques for protection
  • Explain authentication factors and federated identity use
  • Determine secure storage and distribution of security secrets

Prerequisites

  • Basic familiarity with cloud security terminology
  • Readiness to practice through applied exercises or case studies

Instructors

R

Rick Smith

Lecturer

Topics

Cloud Computing
Information Technology
Computer Security and Networks
Computer Science
Open Web Application Security Project (OWASP)
Web Services
Secure Coding
Key Management
Cloud Services
Cryptography

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

الحوسبة السحابية
تكنولوجيا المعلومات
أمن الحاسوب والشبكات
علوم الحاسوب
مشروع أمان تطبيقات الويب المفتوحة (OWASP)
خدمات الويب
البرمجة الآمنة
إدارة المفاتيح
Cloud Services
Cryptography

Start Learning Now