Company: Pluralsight Author: Kevin Jackson Full Title: Providing Secure Cloud Applications Year: 2018 Language: English Genre: Educational: Cloud computing Skill Level: Intermediate Price: - - Files: MP4 (+ Slides .PDF) Time: 02:17:00 Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 350 kbps Audio: AAC at 67 Kbps, 2 channels, 44.1 KHz Cloud Computing is changing industries and careers. This course will train you to design secure cloud applications, how to successfully migrate legacy applications to the cloud, and how to securely operate in the cloud computing environment. Cloud computing has rocked every industry and has completely redefined enterprise information technology. Developers must now use DevSecOps, Serverless Computing, and Microservices to invent and deploy entirely new business models. In this course, Providing Secure Cloud Applications, you will learn how to do this in a secure manner. First, you will learn how to design a secure cloud application. Next, you will discover how to successfully migrate legacy applications to the cloud. Finally, you will explore how to securely operate in the cloud computing environment. When you have finished this course, you will be prepared to develop and deploy secure cloud applications that deliver true value to your organization. Lessons: 1. Course Overview 01. Course Overview 2. Training Developers for the Cloud 02. Course Introduction 03. Module Introduction 04. Loose Coupling 05. Base Transactionality 06. Cloud Development Basics 07. Microservices and Serverless Architectures 08. OWASP Top 10 Vulnerabilities 09. OWASP 2013 vs. 2017 3. Software Assurance and Validation 10. Module Introduction 11. Top-level Application Development Processes 12. Organizational Normative Framework 13. Provisioning and Operating the Application 14. Application Security Testing 15. Source Code Review 16. Cloud-based Functional Testing 4. Using Verified Secure Software 17. Module Introduction 18. US DHS Software Assurance Program 19. Application Programming Interfaces 20. Open Source Community Software 21. Software Supply Chain Management 5. Secure Software Implementation 22. Module Introduction 23. Secure Application Operations 24. Software/Infrastructure Configuration Management and Versioning 6. Cloud Application Security Risks 25. Introduction 26. STRIDE Threat Model 27. Cloud Threats - Regulatory Non-compliance 28. Cloud Threats - Theft/Loss of Media 29. Application QoS 7. Cloud Application Migration 30. Introduction 31. Application Assessment 32. Application Migration 33. Cryptography 34. VPN Protocols 35. Encrypting Data at Rest 8. Identity and Access Management Solutions 36. Module Introduction 37. Service Provider vs. Identity Provider 38. Multi-factor Authentication 39. Multi-factor Technologies 40. Single Sign-on 9. Auditing the Cloud 41. Module Introduction 42. Audit Objectives 43. Cloud Computing Audit Characteristics 44. Major Audit Types 10. Cloud Business Continuity and Disaster Recovery 45. Module Introduction 46. Disaster Recovery Planning Factors 47. Business Impact Assessment Report 48. Designing a Risk Management Strategy 49. Course Summary Our members see more. Join us! ------------- Our members see more. Join us!