Cybersecurity in the Cloud Specialization

This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks.
- Design a simple cloud service and select appropriate security measures to protect it.
- Associate user roles with appropriate entities deploying or using a cloud service.
- Assess levels of risk and recent vulnerabilities that apply to cloud services.
- Learn and apply basic network security techniques in the cloud environment.

Sort options

Cloud Top Ten Risks (Coursera)

After completing the course, the student should be able to do the following: Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and [...]

Cloud Security Basics (Coursera)

This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic [...]

Cloud Application Security (Coursera)

After completing the course, the student should be able to do the following: list and describe the OWASP Top 10 vulnerabilities; identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment; list and describe the different types of virtualization [...]

Cloud Data Security (Coursera)

This course gives learners an opportunity to explore data security in the cloud. In this course, learners will: dive into the data services offered by cloud providers and compare their security features; analyze a data breach and trace it back to the vulnerability that made it possible; learn about [...]