Cloud Top Ten Risks (Coursera)
Categories
Effort
Languages
After completing the course, the student should be able to do the following: Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and [...]
Oct 2nd 2023