- Level Professional
- Duration 9 hours
- Course by University of Minnesota
-
Offered by
About
After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.Modules
Introduction
1
Assignment
- OWASP Top Ten Risks (practice)
3
Videos
- Cloud Top Ten Risks
- Top Ten Cloud Security Risks from Course 3: Cloud Application Security
- OWASP Risk Assessment
1
Readings
- OWASP Top Ten Risks Applied to the Cloud
Risk #1: Injection
1
Assignment
- Injection
2
Videos
- Injection (Risk #1)
- Preventing Injection
2
Readings
- OWASP Assessment of the Injection Risk
- Security Testing for Injection Vulnerabilities
Introduction to the Risks
2
Videos
- Cloud Risks 2, 3, and 4
- OWASP Risks #2, #3, #4 from Course 3: Cloud Application Security
Risk #2: Broken Authentication
1
Assignment
- Authentication
3
Videos
- #2: Broken Authentication
- Optimize Password Security
- Hardening the Authentication Process
1
Readings
- Broken Authentication: OWASP Risk Assessment
Risk #3: Sensitive Data Exposure
1
Assignment
- Sensitive Data Exposure (practice)
1
Videos
- #3: Sensitive Data Exposure
2
Readings
- Sensitive Data Exposure: OWASP Risk Assessment
- Fifteen Major Data Breaches
Risk #4: Flooding
1
Assignment
- Risks #3 & 4
1
Videos
- #4: Flooding
2
Readings
- Lack of Resources & Rate Limiting: OWASP Risk Assessment
- How a dorm-room scam brought down the Internet
Introduction to the Risks
2
Videos
- Cloud Risks 5, 6, and 7
- OWASP Risks #5, #6, #7 from Course 3: Cloud Application Security
Risk #5: Broken Access Control
1
Assignment
- Access Control Risks (practice)
1
Videos
- Broken Access Control (Risk #5)
1
Readings
- Designing Access Controls
Risk #6 & 7: Security Misconfiguration & XSS
1
Assignment
- Module 3
2
Videos
- Security Misconfiguration (Risk #6)
- Cross-Site Scripting (Risk #7)
Introduction and Risk #8: Insecure Deserialization
3
Videos
- Cloud Risks 8, 9, and 10
- OWASP Risks #8, #9, #10 from Course 3: Cloud Application Security
- Insecure Deserialization (Risk #8)
Risks #9 & 10: Flawed Components & Insufficient Monitoring
1
Assignment
- Module 4
2
Videos
- Components with Known Flaws (Risk #9)
- Insufficient Logging and Monitoring (Risk #10)
Auto Summary
"Cloud Top Ten Risks" is a professional-level IT & Computer Science course on Coursera, focusing on cloud cybersecurity. Led by expert instructors, it covers OWASP Top Ten Risks, cryptographic techniques, and strategies against various cyber attacks. The course lasts 540 minutes and offers Starter and Professional subscription options, ideal for IT professionals looking to enhance their cloud security skills.

Rick Smith