Back to Cloud Top Ten Risks
University of Minnesota

Cloud Top Ten Risks

After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.

Status: Security Controls
Status: Infrastructure Security
IntermediateCourse9 hours

Featured reviews

VR

5.0Reviewed Jul 27, 2021

Course was excellent and explanations with examples were useful.

All reviews

Showing: 4 of 4

Vijayendra Rao
5.0
Reviewed Jul 28, 2021
Junaid Muddassir
5.0
Reviewed Nov 2, 2022
NIKIL V
5.0
Reviewed Mar 27, 2025
RIDDHI TRIVEDI
2.0
Reviewed May 11, 2021