Secure Cloud Applications, Users, and Related Technologies
The distributed nature of the cloud presents a challenge for protecting assets. This course will teach you the frameworks for securing cloud applications, users, and other assets.
What you'll learn
In the next year and beyond, many companies plan to move almost all of their applications to the cloud, while some larger corporations have already moved one hundred percent of their applications to the cloud! Protecting valuable assets within the distributed nature of the cloud then presents a challenge. In this course, Secure Cloud Applications, Users, and Related Technologies, you’ll learn to apply frameworks for securing cloud applications, users, and other assets. First, you’ll explore application security in the cloud. Next, you’ll discover how to employ IAM tools to manage least privilege access for users. Finally, you’ll learn how to categorize and protect related technologies. When you’re finished with this course, you’ll have the skills and knowledge of Secure Cloud Applications, Users, and Related Technologies needed to protect your distributed cloud assets.
Table of contents
Course FAQ
O'Reilly Learning did a survey in 2020 and found that 25% of their respondents said that their companies plan to move all of their applications to a cloud context in the next year. This includes 17% of respondents from large organizations over 10,000 employees that have already moved 100% of their applications to the cloud.
This course is especially helpful for learners on the Certificate of Cloud Security Knowledge (CCSK & CCSK Plus) Path.
This course covers managing app security, adopting a secure software development lifecycle, employing Identity, Entitlement, and Access management (IAM), and more.
Before beginning this course, you should be familiar with the Introduction to Information Security within Cloud Computing.