返回到 Cloud Top Ten Risks
University of Minnesota

Cloud Top Ten Risks

After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.

状态:Identity and Access Management
状态:Continuous Monitoring
中级课程小时

精选评论

VR

5.0评论日期:Jul 27, 2021

Course was excellent and explanations with examples were useful.

所有审阅

显示:4/4

Vijayendra Rao
5.0
评论日期:Jul 28, 2021
Junaid Muddassir
5.0
评论日期:Nov 2, 2022
NIKIL V
5.0
评论日期:Mar 27, 2025
RIDDHI TRIVEDI
2.0
评论日期:May 11, 2021