Secure Application Architecture & IAM
Cloud
| Expert
- 8 videos | 39m 21s
- Includes Assessment
Examine layers to a secure application architecture, including security devices, cryptography, and sandboxing, and learn about identity and access management (IAM) to help ensure authenticated access to services and hosted applications.
WHAT YOU WILL LEARN
-
describe associated hardware/software components related to the security of cloud applicationsdefine security protocols and measures associated with application data and data packet protectiondescribe isolation and sandboxing as it applies to cloud-hosted applicationsdescribe the virtualization technology associated with cloud-hosted applications
-
describe Federated Identity and its deployment for cloud-hosted application authorization and accessdefine Single Sign-On/Off and its place within the cloud service security frameworkdescribe and deploy Multifactor Authentication within a cloud service security frameworkdescribe the phase of NIST’s SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference between Federated Identity and SSO.
IN THIS COURSE
-
6m 22sAfter completing this video, you will be able to describe the hardware/software components associated with the security of cloud applications. FREE ACCESS
-
4m 47sFind out how to define security protocols and measures associated with protecting application data and data packets. FREE ACCESS
-
4m 33sAfter completing this video, you will be able to describe isolation and sandboxing as they apply to cloud-hosted applications. FREE ACCESS
-
4m 16sUpon completion of this video, you will be able to describe the virtualization technology associated with cloud-hosted applications. FREE ACCESS
-
7m 41sAfter completing this video, you will be able to describe Federated Identity and its deployment for authorizing and accessing cloud-hosted applications. FREE ACCESS
-
2m 58sIn this video, you will learn how to define Single Sign-On/Off and its place within the cloud service security framework. FREE ACCESS
-
3m 39sAfter completing this video, you will be able to describe and deploy multifactor authentication within a cloud service security framework. FREE ACCESS
-
5m 5sUpon completion of this video, you will be able to describe the phase of NIST's SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference between Federated Identity and SSO. FREE ACCESS