Author
Updated
9/17/2020Released
9/25/2019- Different software development methodologies
- Security implications of DevOps
- Security vulnerabilities, including SQL injection
- Secure coding practices, including proper error handling
- Identifying threats
- Developer training and awareness
- Secure cloud application architecture
Skill Level Intermediate
Duration
Views
- Applications are on the front lines of cloud security efforts. Whether you're using software as a service, platform as a service, infrastructure as a service, or a mix of these architectures, we all use applications every day, and attackers seek to exploit those applications to achieve their goals. Cloud security professionals must understand how to secure applications against these attacks, wherever they are hosted, and businesses around the world need skilled, confident professionals to build out their application security programs. The certified cloud security professional, or CCSP certification, is a path that many technologists follow to advance their careers in this high-demand field. Hi, I'm Mike Chapple, and I'd like to invite you to watch my course on cloud application security. It's part of a seven-course series preparing you for the CCSP exam. I hope that you'll join me as we explore how you can build security into your cloud applications.
Related Courses
-
CCSP Cert Prep: 2 Cloud Data Security
with Mike Chapple2h 4m Intermediate
-
Introduction
-
Study resources1m 28s
-
1. Secure Software Development Lifecycle
-
Development methodologies5m 47s
-
Maturity models3m 29s
-
DevOps4m 5s
-
-
2. Application Security Vulnerabilities
-
Preventing SQL injection4m 56s
-
Privilege escalation2m 8s
-
Directory traversal3m 16s
-
Overflow attacks3m 25s
-
Session hijacking3m 50s
-
Code execution attacks2m 49s
-
3. Secure Coding Practices
-
Code repositories5m 55s
-
Code signing3m 9s
-
4. Software Security Assessment
-
Identifying threats2m 14s
-
Risk analysis and mitigation3m 24s
-
Software testing2m 57s
-
-
5. Verified Secure Software
-
Third-party code4m 54s
-
Acquired software3m 28s
-
-
6. Cloud Application Architecture
-
Web application firewalls3m 31s
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Securing cloud applications