Application Security Awareness & Validation
Cloud
| Expert
- 8 videos | 50m 21s
- Includes Assessment
More and more end-user applications are now being hosted in a cloud system. Examine the need for security training and awareness, and learn the importance of cloud-based application software assurance, validation, and verification.
WHAT YOU WILL LEARN
-
describe awareness and required training to develop an understanding of security focus areas relating to cloud applicationsdescribe common issues relating to the development of cloud-based applicationsdescribe common security issues relating to Cloud-hosted applications. Define the importance of foreknowledge regarding cloud application vulnerabilities and OWASP research.describe the application development life cycle with reference to cloud security
-
define functional testing as it relates to cloud-based application softwaredescribe application testing with reference to cloud security. Describe SAST, DAST, and Penetrative Testing methodologies.outline the deployment of verified and approved APIsdescribe the significance of surfacing the Supply-Chain with reference to cloud-hosted application software
IN THIS COURSE
-
6m 34sUpon completion of this video, you will be able to describe awareness and required training to develop an understanding of security focus areas relating to cloud applications. FREE ACCESS
-
8m 13sAfter completing this video, you will be able to describe common issues relating to the development of cloud-based applications. FREE ACCESS
-
5m 21sUpon completion of this video, you will be able to describe common security issues relating to Cloud-hosted applications. Define the importance of foreknowledge regarding cloud application vulnerabilities and OWASP research. FREE ACCESS
-
7m 2sAfter completing this video, you will be able to describe the application development life cycle in relation to cloud security. FREE ACCESS
-
5m 16sDuring this video, you will learn how to define functional testing in relation to cloud-based application software. FREE ACCESS
-
5m 43sAfter completing this video, you will be able to describe application testing with reference to cloud security. You will be able to describe SAST, DAST, and Penetrative Testing methodologies. FREE ACCESS
-
8m 32sIn this video, find out how to outline the deployment of verified and approved APIs. FREE ACCESS
-
3m 40sAfter completing this video, you will be able to describe the significance of surfacing the Supply-Chain with reference to cloud-hosted application software. FREE ACCESS