Cloud Top Ten Risks

Intermediate Level
9 hours to complete 3 weeks at 3 hours a week
Flexible Schedule

Rick Smith

Skills You’ll Gain

Security Testing Cloud Computing Cloud Security Identity and Access Management Security Controls Authentications Open Web Application Security Project (OWASP) Data Security Secure Coding Cybersecurity Authorization (Computing) Cryptography Application Security Cyber Risk Vulnerability Management System Monitoring Threat Management

Shareable Certificate

Earn a shareable certificate to add to your LinkedIn profile.

Develop Your Specialized Knowledge

Learn new concepts from industry experts

Gain a foundational understanding of a subject or tool

Develop job-relevant skills with hands-on projects

Earn a shareable career certificate

There are 4 modules in this course

Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.

This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).

This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.

This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.