After completing the course, the student should be able to do the following:
● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring....
최상위 리뷰
필터링 기준:
Cloud Top Ten Risks의 2개 리뷰 중 1~2
교육 기관: Vijayendra R
•
2021년 7월 28일
Course was excellent and explanations with examples were useful.
교육 기관: RIDDHI T
•
2021년 5월 11일
I did not get interesting or innovative stuff in this course. I was expecting that this course can be a good foundation for research in cloud security.