Cloud Application Security
This course is part of Cybersecurity in the Cloud Specialization
Instructor: Rick Smith
Skills you'll gain
There are 4 modules in this course
● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.
Architecture and Authentication
Session Management
Providers, Crypto, and Scripts
Explore more from Cloud Computing
©2025 ementorhub.com. All rights reserved