Back to Cloud Application Security
University of Minnesota

Cloud Application Security

After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.

Status: Open Web Application Security Project (OWASP)
Status: Web Services
IntermediateCourse6 hours

Featured reviews

RP

5.0Reviewed Oct 8, 2021

V​ery Good Course to get a overall picture and be alert of most used and general Security issues and protections.

NR

5.0Reviewed Oct 14, 2023

I really like the content and the way professor explained it and references to articles was very helpful.

All reviews

Showing: 10 of 10

Dhiraj Sancheti
5.0
Reviewed Jul 11, 2021
R A Nuwan Danushka Premaratne
5.0
Reviewed Oct 9, 2021
Neelam Raheja
5.0
Reviewed Oct 15, 2023
Marta Regina Santos
5.0
Reviewed Mar 1, 2025
Junaid Muddassir
5.0
Reviewed Nov 1, 2022
Jesús Arturo Pérez Díaz
4.0
Reviewed May 24, 2022
Tony iheanacho
4.0
Reviewed Jul 17, 2025
David Zakson
3.0
Reviewed Sep 20, 2021
NALIOMO FENDA MOKI LINONGE
3.0
Reviewed Nov 4, 2021
Sai Sandeep Mandapaka
2.0
Reviewed Jun 22, 2021