Cloud Top Ten Risks

Instructor: Rick Smith

Intermediate Level • 9 hours to complete 3 weeks at 3 hours a week • Flexible Schedule

Skills You'll Gain

Security Testing
Cloud Computing
Cloud Security
Identity and Access Management
Security Controls
Authentications
Open Web Application Security Project (OWASP)
Data Security
Secure Coding
Cybersecurity
Authorization (Computing)
Cryptography
Application Security
Cyber Risk
Vulnerability Management
System Monitoring
Threat Management

Shareable Certificate

Earn a shareable certificate to add to your LinkedIn profile

Outcomes

  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 4 modules in this course

Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.

This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).

This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.

This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.