Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
After completing the course, the student should be able to do the following:
β Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
β Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
β Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
β Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
Tags
Syllabus
- Overview of the Top Ten Risks
- Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.
- Cloud Risks 2, 3, and 4
- This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).
- Cloud Risks 5, 6, and 7
- This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.
- Cloud Risks 8, 9, and 10
- This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/6e3eca37572b.png)
Cloud Top Ten Risks
Affiliate notice
-
TypeOnline Course
-
Provider
After completing the course, the student should be able to do the following:
β Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
β Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
β Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
β Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
β Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
β Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
β Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
β Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
- Overview of the Top Ten Risks
- Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.
- Cloud Risks 2, 3, and 4
- This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).
- Cloud Risks 5, 6, and 7
- This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.
- Cloud Risks 8, 9, and 10
- This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.
Loading...
Saving...
Loading...