Coursera
Coursera Logo

UMN - Cloud Top Ten Risks 

  • Offered byCoursera

Cloud Top Ten Risks
 at 
Coursera 
Overview

Duration

9 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cloud Top Ten Risks
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 4 of 4 in the Cybersecurity in the Cloud Specialization
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Intermediate Level
  • Approx. 9 hours to complete
  • English Subtitles: English
Read more
Details Icon

Cloud Top Ten Risks
 at 
Coursera 
Course details

More about this course
  • After completing the course, the student should be able to do the following:
  • ? Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
  • ? Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
  • ? Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
  • ? Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.

Cloud Top Ten Risks
 at 
Coursera 
Curriculum

Overview of the Top Ten Risks

Cloud Top Ten Risks

Top Ten Cloud Security Risks from Course 3: Cloud Application Security

OWASP Risk Assessment

Injection (Risk #1)

Preventing Injection

OWASP Top Ten Risks Applied to the Cloud

OWASP Assessment of the Injection Risk

Security Testing for Injection Vulnerabilities

OWASP Top Ten Risks (practice)

Injection

Cloud Risks 2, 3, and 4

Cloud Risks 2, 3, and 4

OWASP Risks #2, #3, #4 from Course 3: Cloud Application Security

#2: Broken Authentication

Optimize Password Security

Hardening the Authentication Process

#3: Sensitive Data Exposure

#4: Flooding

Broken Authentication: OWASP Risk Assessment

Sensitive Data Exposure: OWASP Risk Assessment

Fifteen Major Data Breaches

Lack of Resources & Rate Limiting: OWASP Risk Assessment

How a dorm-room scam brought down the Internet

Authentication

Sensitive Data Exposure (practice)

Risks #3 & 4

Cloud Risks 5, 6, and 7

Cloud Risks 5, 6, and 7

OWASP Risks #5, #6, #7 from Course 3: Cloud Application Security

Broken Access Control (Risk #5)

Security Misconfiguration (Risk #6)

Cross-Site Scripting (Risk #7)

Designing Access Controls

Access Control Risks (practice)

Module 3

Cloud Risks 8, 9, and 10

OWASP Risks #8, #9, #10 from Course 3: Cloud Application Security

Insecure Deserialization (Risk #8)

Components with Known Flaws (Risk #9)

Insufficient Logging and Monitoring (Risk #10)

Module 4

Cloud Top Ten Risks
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cloud Top Ten Risks
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...