Cloud Security

Sort options

Cloud Technologies & Services (Coursera)

Jul 4th 2022
Cloud Technologies & Services (Coursera)
Course Auditing
Categories
Effort
Languages
The Cloud Technology course is intended to level set learners on key products and technologies - such as compute, storage and networking that make up the "Cloud". In addition, learners will learn basic concepts of other technologies like containers, media and telemetry.

Palo Alto Networks Cloud Security Fundamentals (Coursera)

In this Cloud Security Fundamentals course you will learn basic principles associated with securing the cloud and SaaS-based applications through Secure Access Service Edge architecture and identify concepts required to recognize and potentially mitigate attacks against traditional and hybrid datacenters as well as mission critical [...]

Cloud Application Security (Coursera)

After completing the course, the student should be able to do the following: list and describe the OWASP Top 10 vulnerabilities; identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment; list and describe the different types of virtualization [...]

Understanding Google Cloud Security and Operations Français (Coursera)

Jun 27th 2022
Understanding Google Cloud Security and Operations Français (Coursera)
Course Auditing
Categories
Effort
Languages
Ce cours porte sur la gestion des coûts, la sécurité et les opérations dans le cloud. Pour commencer, il montre comment les entreprises peuvent choisir de maintenir ou non une partie de leur infrastructure propre en acquérant des services informatiques auprès d'un fournisseur cloud. Il explique ensuite comment la [...]

Check Point Jump Start - CloudGuard Workload Protection (Coursera)

The purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under [...]

Understanding Google Cloud Security and Operations (Coursera)

Jun 27th 2022
Understanding Google Cloud Security and Operations (Coursera)
Course Auditing
Categories
Effort
Languages
This course examines cost management, security, and operations in the cloud. First, it explores how businesses can choose to maintain some or none of their own infrastructure by purchasing IT services from a cloud provider. Next, it explains how the responsibility of data security is shared between the cloud [...]

Introduction to AWS Identity and Access Management (Coursera)

Jun 27th 2022
Introduction to AWS Identity and Access Management (Coursera)
Course Auditing
Categories
Effort
Languages
Security should be your first priority when developing cloud native applications. The goal of this course is to provide you with foundational knowledge and skills that will enable you to grow in your use of both AWS IAM and the rest of the AWS ecosystem. Throughout the course, the [...]

Cloud Security Basics (Coursera)

This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic [...]

Enterprise and Infrastructure Security (Coursera)

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to [...]

Cyber Threats and Attack Vectors (Coursera)

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I [...]