- Level Professional
- المدة 6 ساعات hours
- الطبع بواسطة University of Minnesota
-
Offered by
عن
After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.الوحدات
Introduction
3
Videos
- Introduction to Cloud Application Security
- The Evolution of Packet Networking
- The Troubles of Packet Networking
1
Readings
- Welcome to Cloud Application Security
OWASP Top Ten Risks for the Cloud
1
Assignment
- Module 1
4
Videos
- Top Ten Cloud Security Risks
- OWASP Risks #2, #3, #4
- OWASP Risks #5, #6, #7
- OWASP Risks #8, #9, #10
1
Readings
- OWASP Top Ten Risks Applied to the Cloud
Architecture
2
Videos
- Application Architecture
- Service Authentication
Authentication Mechanisms
1
Assignment
- Module 2
2
Videos
- Strong Authentication
- Cracking Authentication
1
Readings
- OPTIONAL - But Fun - Video Examples
Sessions
1
Assignment
- Module 3
3
Videos
- Session State
- Session Cookies
- Session Persistence and Timeouts
2
Readings
- OWASP Session Cheat Sheet
- OPTIONAL: How to Hack a Website
Provider Trust and Crypto
2
Videos
- Trusting a Cloud Provider
- Cloud Provider Cryptography
Cross-Site Scripting (XSS)
1
Assignment
- Module 4
2
Videos
- Cross-Site Scripting Attacks
- Reflected Cross-Site Scripting
1
Readings
- Articles about XSS Attacks
Auto Summary
"Cloud Application Security" is a professional-level course in IT & Computer Science, offered by Coursera. It focuses on understanding and mitigating the OWASP Top 10 vulnerabilities, implementing cloud security in development, and utilizing virtualization for protection. The course also covers authentication factors and secure management of crypto keys and passwords. With a duration of 360 minutes, it's available through Starter and Professional subscription options, making it ideal for IT professionals seeking to enhance their cloud security expertise.

Rick Smith