Protecting data and applications in the cloud is more critical than ever—and this course shows you exactly how it’s done. Cloud Data and Application Security takes you on a practical journey through the core defenses that keep cloud systems trustworthy and resilient.

Cloud Data & Application Security

Cloud Data & Application Security
This course is part of Certified Cloud Security Professional Exam Prep Specialization

Instructor: LearnKartS
Access provided by VodafoneZiggo
What you'll learn
Understand the cloud data lifecycle, applyencryptionand key management, and use privacy andloss-preventioncontrols to protect information.
Strengthen cloud apps using secure SDLC, threat modeling,DevSecOpspractices, and security testing techniques like SAST, DAST, and validation.
Identifycloud application risks, prevent injection attacks, and secure APIs and interfaces using core OWASP principles and defensive controls.
Build governance skills through regulatory mapping, risk assessment, mitigation steps, audit trails, stewardship, and strong data management.
Skills you'll gain
- Application Programming Interface (API)
- Data Encryption Standard
- DevSecOps
- Cloud Storage
- Open Web Application Security Project (OWASP)
- Secure Coding
- Application Security
- Encryption
- Key Management
- Cloud Applications
- Personally Identifiable Information
- Data Governance
- Cloud Security
- Data Security
- OAuth
- General Data Protection Regulation (GDPR)
- Information Privacy
- Cloud API
- Threat Modeling
- Data Management
Details to know

Add to your LinkedIn profile
18 assignments
December 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
This section explores how data is created, stored, transmitted, classified, encrypted, and protected throughout its lifecycle in the cloud. It covers key management, tokenization, masking, anonymization, privacy regulations, and how breaches impact real-world organizations.
What's included
19 videos6 assignments
This section focuses on securing cloud applications through secure SDLC, threat modeling, DevSecOps practices, and defense against common vulnerabilities. It deepens your understanding of API security, OWASP Top 10 risks, secure design, and controls used to protect modern cloud applications.
What's included
18 videos6 assignments
This section introduces privacy laws, compliance frameworks, cloud audits, and risk assessment methods used to govern cloud environments. It also covers third-party risk, mitigation strategies, data stewardship, audit trails, retention policies, and how organizations meet regulatory and security obligations.
What's included
19 videos6 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Information Technology

University of Minnesota

University of Minnesota

Illinois Tech

Illinois Tech

