Secure Application Architecture & IAM

Cloud    |    Expert
  • 8 videos | 39m 21s
  • Includes Assessment
Likes 1981 Likes 1981
Examine layers to a secure application architecture, including security devices, cryptography, and sandboxing, and learn about identity and access management (IAM) to help ensure authenticated access to services and hosted applications.

WHAT YOU WILL LEARN

  • describe associated hardware/software components related to the security of cloud applications
    define security protocols and measures associated with application data and data packet protection
    describe isolation and sandboxing as it applies to cloud-hosted applications
    describe the virtualization technology associated with cloud-hosted applications
  • describe Federated Identity and its deployment for cloud-hosted application authorization and access
    define Single Sign-On/Off and its place within the cloud service security framework
    describe and deploy Multifactor Authentication within a cloud service security framework
    describe the phase of NIST’s SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference between Federated Identity and SSO.

IN THIS COURSE

  • 6m 22s
    After completing this video, you will be able to describe the hardware/software components associated with the security of cloud applications. FREE ACCESS
  • 4m 47s
    Find out how to define security protocols and measures associated with protecting application data and data packets. FREE ACCESS
  • Locked
    3.  Isolation
    4m 33s
    After completing this video, you will be able to describe isolation and sandboxing as they apply to cloud-hosted applications. FREE ACCESS
  • Locked
    4.  Virtualization
    4m 16s
    Upon completion of this video, you will be able to describe the virtualization technology associated with cloud-hosted applications. FREE ACCESS
  • Locked
    5.  Federation and Identity Provision
    7m 41s
    After completing this video, you will be able to describe Federated Identity and its deployment for authorizing and accessing cloud-hosted applications. FREE ACCESS
  • Locked
    6.  Single Sign-On/Off (SSO)
    2m 58s
    In this video, you will learn how to define Single Sign-On/Off and its place within the cloud service security framework. FREE ACCESS
  • Locked
    7.  Multifactor Authentication
    3m 39s
    After completing this video, you will be able to describe and deploy multifactor authentication within a cloud service security framework. FREE ACCESS
  • Locked
    8.  Specifying Application Security
    5m 5s
    Upon completion of this video, you will be able to describe the phase of NIST's SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference between Federated Identity and SSO. FREE ACCESS

YOU MIGHT ALSO LIKE

Likes 17 Likes 17  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 244 Likes 244  
Likes 769 Likes 769  
Likes 577 Likes 577