PLU | Providing Secure Cloud Applications (2018 EN)

Discussion in 'Information Technology' started by Kanka, Nov 23, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Likes Received:
    Trophy Points:

    Company: Pluralsight
    Author: Kevin Jackson
    Full Title: Providing Secure Cloud Applications
    Year: 2018
    Language: English
    Genre: Educational: Cloud computing
    Skill Level: Intermediate
    Price: -
    Files: MP4 (+ Slides .PDF)
    Time: 02:17:00
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 350 kbps
    Audio: AAC at 67 Kbps, 2 channels, 44.1 KHz

    Cloud Computing is changing industries and careers. This course will train you to design secure cloud applications, how to successfully migrate legacy applications to the cloud, and how to securely operate in the cloud computing environment.

    Cloud computing has rocked every industry and has completely redefined enterprise information technology. Developers must now use DevSecOps, Serverless Computing, and Microservices to invent and deploy entirely new business models. In this course, Providing Secure Cloud Applications, you will learn how to do this in a secure manner. First, you will learn how to design a secure cloud application. Next, you will discover how to successfully migrate legacy applications to the cloud. Finally, you will explore how to securely operate in the cloud computing environment. When you have finished this course, you will be prepared to develop and deploy secure cloud applications that deliver true value to your organization.

    1. Course Overview
    01. Course Overview
    2. Training Developers for the Cloud
    02. Course Introduction
    03. Module Introduction
    04. Loose Coupling
    05. Base Transactionality
    06. Cloud Development Basics
    07. Microservices and Serverless Architectures
    08. OWASP Top 10 Vulnerabilities
    09. OWASP 2013 vs. 2017
    3. Software Assurance and Validation
    10. Module Introduction
    11. Top-level Application Development Processes
    12. Organizational Normative Framework
    13. Provisioning and Operating the Application
    14. Application Security Testing
    15. Source Code Review
    16. Cloud-based Functional Testing
    4. Using Verified Secure Software
    17. Module Introduction
    18. US DHS Software Assurance Program
    19. Application Programming Interfaces
    20. Open Source Community Software
    21. Software Supply Chain Management
    5. Secure Software Implementation
    22. Module Introduction
    23. Secure Application Operations
    24. Software/Infrastructure Configuration Management and Versioning
    6. Cloud Application Security Risks
    25. Introduction
    26. STRIDE Threat Model
    27. Cloud Threats - Regulatory Non-compliance
    28. Cloud Threats - Theft/Loss of Media
    29. Application QoS
    7. Cloud Application Migration
    30. Introduction
    31. Application Assessment
    32. Application Migration
    33. Cryptography
    34. VPN Protocols
    35. Encrypting Data at Rest
    8. Identity and Access Management Solutions
    36. Module Introduction
    37. Service Provider vs. Identity Provider
    38. Multi-factor Authentication
    39. Multi-factor Technologies
    40. Single Sign-on
    9. Auditing the Cloud
    41. Module Introduction
    42. Audit Objectives
    43. Cloud Computing Audit Characteristics
    44. Major Audit Types
    10. Cloud Business Continuity and Disaster Recovery
    45. Module Introduction
    46. Disaster Recovery Planning Factors
    47. Business Impact Assessment Report
    48. Designing a Risk Management Strategy
    49. Course Summary