Chevron Left
Back to Cloud Application Security

Learner Reviews & Feedback for Cloud Application Security by University of Minnesota

About the Course

After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed....
Filter by:

1 - 2 of 2 Reviews for Cloud Application Security

By Dhiraj S

Jul 11, 2021

After completing the course, Got the indepth concepts of the following:

● Complete measurement of the OWASP Top 10 vulnerabilities.

● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment.

● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client.

● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication.

● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.

By Sai S M

Jun 22, 2021

Not that useful.