Course

Cybersecurity in the Cloud

University of Minnesota

This Specialization introduces novice software developers to essential cybersecurity concepts and their application in cloud deployments. Learners will develop proficiency in assessing cloud vulnerabilities and attack reports and utilizing available features to address classic cybersecurity risks.

The course comprises four modules:

  1. Cloud Security Basics
  2. Cloud Data Security
  3. Cloud Application Security
  4. Cloud Top Ten Risks

Certificate Available ✔

Get Started / More Info
Cybersecurity in the Cloud
Course Modules

This course encompasses four modules, covering essential security measures for cloud services, data breach analysis, application security assurance, and strategies to resist cyberattacks.

Cloud Security Basics

Design a simple cloud service and select appropriate security measures to protect it. Associate user roles with entities deploying or using a cloud service. Assess levels of risk and vulnerabilities that apply to cloud services. Learn and apply basic network security techniques in the cloud environment.

Cloud Data Security

Learn how to analyze a data breach and trace it back to the vulnerability that made it possible. Understand data security and privacy requirements arising from legal obligations and industry standards.

Cloud Application Security

After completing this module, learners will be able to list and describe the OWASP Top 10 vulnerabilities and identify methods to provide cloud security assurance as part of the development life cycle. They will also be able to describe different types of virtualization or sandboxing used to protect cloud applications, and explain the application of authentication factors and federated identity solutions in cloud client and server authentication.

Cloud Top Ten Risks

After completing this module, learners will be able to associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks, apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data, and identify effective strategies to resist injection attacks, cross-site scripting attacks, and object deserialization attacks. They will also be able to assess strategies to address risks posed by administrative failures.

More Cloud Computing Courses

Build Device Messaging and Communication in Azure IoT Hub

Coursera Project Network

In this project-based course, learn to create, configure, and communicate with Azure IoT Hub, send and monitor messages, utilize message routing, and simulate device...

Entity and Sentiment Analysis with the Natural Language API

Google Cloud

Entity and Sentiment Analysis with the Natural Language API empowers learners to extract entities and perform sentiment analysis using the Cloud Natural Language...

Manage Azure Blob Storage Lifecycle

Coursera Project Network

Manage Azure Blob Storage Lifecycle is a beginner-level guided project that teaches you how to set up a storage account, transfer blobs to different tiers, and automate...

VPC Network Peering

Google Cloud

Learn to establish private connectivity across two Google Cloud Platform (GCP) Virtual Private Cloud (VPC) networks using VPC Network Peering.