YoVDO

Cybersecurity in the Cloud

Offered By: University of Minnesota via Coursera

Tags

Cybersecurity Courses Cloud Computing Courses Risk Assessment Courses Cloud Security Courses Cloud Application Security Courses

Course Description

Overview

This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks.

Syllabus

Course 1: Cloud Security Basics
- Offered by University of Minnesota. This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security ... Enroll for free.

Course 2: Cloud Data Security
- Offered by University of Minnesota. This course gives learners an opportunity to explore data security in the cloud. In this course, ... Enroll for free.

Course 3: Cloud Application Security
- Offered by University of Minnesota. After completing the course, the student should be able to do the following: ● List and describe the ... Enroll for free.

Course 4: Cloud Top Ten Risks
- Offered by University of Minnesota. After completing the course, the student should be able to do the following: ● Associate lists of OWASP ... Enroll for free.


Courses

  • 0 reviews

    12 hours 46 minutes

    View details
    This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques.
  • 0 reviews

    9 hours 1 minute

    View details
    After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
  • 0 reviews

    5 hours 49 minutes

    View details
    After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.
  • 0 reviews

    10 hours 31 minutes

    View details
    This course gives learners an opportunity to explore data security in the cloud. In this course, learners will: * Dive into the data services offered by cloud providers and compare their security features. * Analyze a data breach and trace it back to the vulnerability that made it possible. * Learn about database injection and aggregation attacks. * Follow the life cycle of a data item and its relationship to privacy and integrity. * Associate modern privacy requirements with US and European laws.

Taught by

Rick Smith

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera