Cloud Application Security
Offered By: University of Minnesota via Coursera
Course Description
Overview
After completing the course, the student should be able to do the following:
● List and describe the OWASP Top 10 vulnerabilities.
● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment.
● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client.
● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication.
● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.
Syllabus
- Application Security Risks
- This module introduces the course and reviews OWASP "Top Ten" risks relevant to cloud computing. There are also background videos on packet network operation.
- Architecture and Authentication
- A discussion of server architecture principles and survey of user authentication mechanisms.
- Session Management
- The session mechanism maintains application state across independent, stateless transactions via HTTP or a web API.
- Providers, Crypto, and Scripts
- These videos cover additional topics: provider trust, using provider crypto, and security mechanisms for preventing script-based attacks.
Taught by
Rick Smith
Tags
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Defined Networking
Georgia Institute of Technology via Coursera Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera Web-Technologien
openHPI Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique