YoVDO

Cloud Top Ten Risks

Offered By: University of Minnesota via Coursera

Tags

Cybersecurity Courses Cloud Computing Courses Cryptography Courses Risk Mitigation Courses Cloud Security Courses Injection Attacks Courses

Course Description

Overview

After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.

Syllabus

  • Overview of the Top Ten Risks
    • Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.
  • Cloud Risks 2, 3, and 4
    • This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).
  • Cloud Risks 5, 6, and 7
    • This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.
  • Cloud Risks 8, 9, and 10
    • This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.

Taught by

Rick Smith

Tags

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Defined Networking
Georgia Institute of Technology via Coursera
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Web-Technologien
openHPI
Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique