Secure Cloud Applications, Users, and Related Technologies
The distributed nature of the cloud presents a challenge for protecting assets. This course will teach you the frameworks for securing cloud applications, users, and other assets.
In the next year and beyond, many companies plan to move almost all of their applications to the cloud, while some larger corporations have already moved one hundred percent of their applications to the cloud! Protecting valuable assets within the distributed nature of the cloud then presents a challenge. In this course, Secure Cloud Applications, Users, and Related Technologies, you’ll learn to apply frameworks for securing cloud applications, users, and other assets. First, you’ll explore application security in the cloud. Next, you’ll discover how to employ IAM tools to manage least privilege access for users. Finally, you’ll learn how to categorize and protect related technologies. When you’re finished with this course, you’ll have the skills and knowledge of Secure Cloud Applications, Users, and Related Technologies needed to protect your distributed cloud assets.
Author Name: Dr. Lyron H. Andrews
Author Description:
Dr. Andrews’ technology career spans three decades. His roles included network manager New York City Department of Education, BMG Direct senior director of IT, and BNY Mellon dean of technology. His doctoral research at Teachers College Columbia found that critical thinking skills thrive in environments that are supportive of five essential elements in the mind of a critical thinker. He teaches cyber security. He has integrated technology management with teaching at Columbia University and other… more
Table of Contents
- Course Overview
1min - Managing Application Security in the Cloud
23mins - Employing Identity, Entitlement, and Access Management
26mins - Reviewing Related Technologies
13mins
There are no reviews yet.