Cloud Top Ten Risks
Instructor: Rick Smith
Intermediate Level • 9 hours to complete 3 weeks at 3 hours a week • Flexible Schedule
Skills You'll Gain
Security Testing
Cloud Computing
Cloud Security
Identity and Access Management
Security Controls
Authentications
Open Web Application Security Project (OWASP)
Data Security
Secure Coding
Cybersecurity
Authorization (Computing)
Cryptography
Application Security
Cyber Risk
Vulnerability Management
System Monitoring
Threat Management
Shareable Certificate
Earn a shareable certificate to add to your LinkedIn profile
Outcomes
-
Learn new concepts from industry experts
-
Gain a foundational understanding of a subject or tool
-
Develop job-relevant skills with hands-on projects
-
Earn a shareable career certificate
There are 4 modules in this course
Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.
This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).
This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.
This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.