UMN - Cloud Application Security
- Offered byCoursera
Cloud Application Security at Coursera Overview
Duration | 6 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Cloud Application Security at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 3 of 4 in the Cybersecurity in the Cloud Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Intermediate Level
- Approx. 6 hours to complete
- English Subtitles: English
Cloud Application Security at Coursera Course details
- After completing the course, the student should be able to do the following:
- ? List and describe the OWASP Top 10 vulnerabilities.
- ? Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment.
- ? List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client.
- ? Describe the application of authentication factors and federated identity solutions in cloud client and server authentication.
- ? Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.
Cloud Application Security at Coursera Curriculum
Application Security Risks
Introduction to Cloud Application Security
The Evolution of Packet Networking
The Troubles of Packet Networking
Top Ten Cloud Security Risks
OWASP Risks #2, #3, #4
OWASP Risks #5, #6, #7
OWASP Risks #8, #9, #10
Welcome to Cloud Application Security
OWASP Top Ten Risks Applied to the Cloud
Module 1
Architecture and Authentication
Application Architecture
Service Authentication
Strong Authentication
Cracking Authentication
OPTIONAL - But Fun - Video Examples
Module 2
Session Management
Session State
Session Cookies
Session Persistence and Timeouts
OWASP Session Cheat Sheet
OPTIONAL: How to Hack a Website
Module 3
Providers, Crypto, and Scripts
Trusting a Cloud Provider
Cloud Provider Cryptography
Cross-Site Scripting Attacks
Reflected Cross-Site Scripting
Articles about XSS Attacks
OPTIONAL: How to Hack a Website
Module 4