Providing Secure Cloud Applications
Cloud Computing is changing industries and careers. This course will train you to design secure cloud applications, how to successfully migrate legacy applications to the cloud, and how to securely operate in the cloud computing environment.
Cloud computing has rocked every industry and has completely redefined enterprise information technology. Developers must now use DevSecOps, Serverless Computing, and Microservices to invent and deploy entirely new business models. In this course, Providing Secure Cloud Applications, you will learn how to do this in a secure manner. First, you will learn how to design a secure cloud application. Next, you will discover how to successfully migrate legacy applications to the cloud. Finally, you will explore how to securely operate in the cloud computing environment. When you have finished this course, you will be prepared to develop and deploy secure cloud applications that deliver true value to your organization.
Author Name: Kevin Jackson
Author Description:
Kevin L. Jackson is a globally recognized cloud computing thought leader and an (ISC)2 Certified Cloud Security Professional instructor. He has also been recognized as a “Top 100 Cloud Computing Experts on Twitter”, a “Top 100 Cybersecurity Influencer and Brand” and a “Top 50 Federal IT Blogger”. His “Cloud Musings” blog receives more than 80,000 views per month. Kevin’s professional career includes service in the US Navy Space Systems Command, Vice President of J.P. Morgan Chase, Worldwide Sale… more
Table of Contents
- Course Overview
1min - Training Developers for the Cloud
22mins - Software Assurance and Validation
20mins - Using Verified Secure Software
14mins - Secure Software Implementation
8mins - Cloud Application Security Risks
18mins - Cloud Application Migration
18mins - Identity and Access Management Solutions
13mins - Auditing the Cloud
9mins - Cloud Business Continuity and Disaster Recovery
11mins
There are no reviews yet.