Securing Cloud Applications, Users and Related Technologies

Securing Cloud Applications, Users and Related Technologies

Identity management and application security for cloud deployments. Topics in this module include federated identity and different IAM applications, secure development, and managing application security in and for the cloud.

Must Purchase Course

About this course

This module covers identity management and application security for cloud deployments. Topics include federated identity and different IAM applications, secure development, and managing application security in and for the cloud. Students will discover how application security differs in cloud computing and how secure software development basics change in the cloud. At the end of this module students will have covered DevOps, secure operations and architecture, IAM standards and what IAM looks like in practice.

Curriculum

  • CCSK - Module 5 - Securing Cloud Applications, Users and Related Technologies
  • Unit 1 - Module Introduction
  • Unit 2 - Secure Software Development Life Cycle (SSDLC)
  • Unit 3 - Testing & Assessment
  • Unit 4 - DevOps
  • Unit 5 - Secure Operations
  • Unit 6 - Identity & Access Management Definitions
  • Unit 7 - IAM Standards
  • Unit 8 - IAM In Practice

About this course

This module covers identity management and application security for cloud deployments. Topics include federated identity and different IAM applications, secure development, and managing application security in and for the cloud. Students will discover how application security differs in cloud computing and how secure software development basics change in the cloud. At the end of this module students will have covered DevOps, secure operations and architecture, IAM standards and what IAM looks like in practice.

Curriculum

  • CCSK - Module 5 - Securing Cloud Applications, Users and Related Technologies
  • Unit 1 - Module Introduction
  • Unit 2 - Secure Software Development Life Cycle (SSDLC)
  • Unit 3 - Testing & Assessment
  • Unit 4 - DevOps
  • Unit 5 - Secure Operations
  • Unit 6 - Identity & Access Management Definitions
  • Unit 7 - IAM Standards
  • Unit 8 - IAM In Practice