Secure Application Architecture & IAM
Cloud
| Expert
- 8 Videos | 39m 21s
- Includes Assessment
- Earns a Badge
Examine layers to a secure application architecture, including security devices, cryptography, and sandboxing, and learn about identity and access management (IAM) to help ensure authenticated access to services and hosted applications.
WHAT YOU WILL LEARN
-
describe associated hardware/software components related to the security of cloud applicationsdefine security protocols and measures associated with application data and data packet protectiondescribe isolation and sandboxing as it applies to cloud-hosted applicationsdescribe the virtualization technology associated with cloud-hosted applications
-
describe Federated Identity and its deployment for cloud-hosted application authorization and accessdefine Single Sign-On/Off and its place within the cloud service security frameworkdescribe and deploy Multifactor Authentication within a cloud service security frameworkdescribe the phase of NIST’s SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference between Federated Identity and SSO.
IN THIS COURSE
-
1.Security Devices6m 22sUP NEXT
-
2.Cryptography4m 47s
-
3.Isolation4m 33s
-
4.Virtualization4m 16s
-
5.Federation and Identity Provision7m 41s
-
6.Single Sign-On/Off (SSO)2m 58s
-
7.Multifactor Authentication3m 39s
-
8.Specifying Application Security5m 5s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.