UMN - Cloud Top Ten Risks
- Offered byCoursera
Cloud Top Ten Risks at Coursera Overview
Duration | 9 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Cloud Top Ten Risks at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 4 of 4 in the Cybersecurity in the Cloud Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Intermediate Level
- Approx. 9 hours to complete
- English Subtitles: English
Cloud Top Ten Risks at Coursera Course details
- After completing the course, the student should be able to do the following:
- ? Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
- ? Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
- ? Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
- ? Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
Cloud Top Ten Risks at Coursera Curriculum
Overview of the Top Ten Risks
Cloud Top Ten Risks
Top Ten Cloud Security Risks from Course 3: Cloud Application Security
OWASP Risk Assessment
Injection (Risk #1)
Preventing Injection
OWASP Top Ten Risks Applied to the Cloud
OWASP Assessment of the Injection Risk
Security Testing for Injection Vulnerabilities
OWASP Top Ten Risks (practice)
Injection
Cloud Risks 2, 3, and 4
Cloud Risks 2, 3, and 4
OWASP Risks #2, #3, #4 from Course 3: Cloud Application Security
#2: Broken Authentication
Optimize Password Security
Hardening the Authentication Process
#3: Sensitive Data Exposure
#4: Flooding
Broken Authentication: OWASP Risk Assessment
Sensitive Data Exposure: OWASP Risk Assessment
Fifteen Major Data Breaches
Lack of Resources & Rate Limiting: OWASP Risk Assessment
How a dorm-room scam brought down the Internet
Authentication
Sensitive Data Exposure (practice)
Risks #3 & 4
Cloud Risks 5, 6, and 7
Cloud Risks 5, 6, and 7
OWASP Risks #5, #6, #7 from Course 3: Cloud Application Security
Broken Access Control (Risk #5)
Security Misconfiguration (Risk #6)
Cross-Site Scripting (Risk #7)
Designing Access Controls
Access Control Risks (practice)
Module 3
Cloud Risks 8, 9, and 10
OWASP Risks #8, #9, #10 from Course 3: Cloud Application Security
Insecure Deserialization (Risk #8)
Components with Known Flaws (Risk #9)
Insufficient Logging and Monitoring (Risk #10)
Module 4