Cloud Security Fundamentals: Cloud Application Security
Cloud Security | Beginner
- 9 videos | 43m 58s
- Includes Assessment
- Earns a Badge
Explore how to secure applications in the cloud, including training and awareness, assurance and validation, the secure software development lifecycle (SDLC), federated services, single sign-on (SSO), and advanced managed services from cloud providers, in this 8-video course. Begin by learning to define training and awareness in application security, and then learn about cloud software assurance and validation. The next tutorial concerns using verified secure software, focusing on two methodologies for security testing or application security testing (AST), in your organization. You will then learn about applying the secure software development lifecycle. You will take a look at comparing cloud application architectures, which includes the five key steps to building a secure cloud-ready application. You will discover federation and SSO solutions, and finally, observe how to compare advanced cloud security products. In the concluding exercise, you are asked to list methods of creating security awareness, methods for enhancing application security in the cloud, and the steps of successful software validation.
WHAT YOU WILL LEARN
discover the key concepts covered in this coursedefine training and awareness securitydescribe software assurance and validationuse verified secure softwareapply the secure software development lifecycle
compare cloud application architecturesdescribe federation and SSO solutionscompare advanced cloud security productslist methods of creating security awareness, methods for enhancing application security in the cloud, and the steps of successful software validation
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course OWASP Overview
Course Top 10 List Items