返回到 Cloud Application Security
University of Minnesota

Cloud Application Security

After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.

状态:Cryptography
状态:Cloud Security
中级课程小时

精选评论

NR

5.0评论日期:Oct 14, 2023

I really like the content and the way professor explained it and references to articles was very helpful.

RP

5.0评论日期:Oct 8, 2021

V​ery Good Course to get a overall picture and be alert of most used and general Security issues and protections.

所有审阅

显示:10/10

Dhiraj Sancheti
5.0
评论日期:Jul 10, 2021
R A Nuwan Danushka Premaratne
5.0
评论日期:Oct 9, 2021
Neelam Raheja
5.0
评论日期:Oct 15, 2023
Marta Regina Santos
5.0
评论日期:Mar 1, 2025
Junaid Muddassir
5.0
评论日期:Nov 1, 2022
Jesús Arturo Pérez Díaz
4.0
评论日期:May 24, 2022
Tony iheanacho
4.0
评论日期:Jul 17, 2025
David Zakson
3.0
评论日期:Sep 20, 2021
NALIOMO FENDA MOKI LINONGE
3.0
评论日期:Nov 4, 2021
Sai Sandeep Mandapaka
2.0
评论日期:Jun 22, 2021