YoVDO

Cloud Application Security

Offered By: University of Minnesota via Coursera

Tags

Application Security (AppSec) Courses Cloud Computing Courses Virtualization Courses Cloud Application Security Courses Sandboxing Courses

Course Description

Overview

After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.

Syllabus

  • Application Security Risks
    • This module introduces the course and reviews OWASP "Top Ten" risks relevant to cloud computing. There are also background videos on packet network operation.
  • Architecture and Authentication
    • A discussion of server architecture principles and survey of user authentication mechanisms.
  • Session Management
    • The session mechanism maintains application state across independent, stateless transactions via HTTP or a web API.
  • Providers, Crypto, and Scripts
    • These videos cover additional topics: provider trust, using provider crypto, and security mechanisms for preventing script-based attacks.

Taught by

Rick Smith

Tags

Related Courses

Application Security and Monitoring
IBM via Coursera
Check Point Jump Start: CloudGuard Workload Protection and Application Security
edX
Get Started with Application Security
Salesforce via Trailhead
CCSP Cert Prep: 4 Cloud Application Security
LinkedIn Learning
CCSP Cert Prep: 4 Cloud Application Security Audio Review
LinkedIn Learning