Securing Applications on the Cloud

Securing Applications on the Cloud

English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 2h 08m | 416 MB

A practical guide for Security Professionals

When organizations move applications to the cloud they increase their security risks. As a cloud security professional, you have to implement more security controls over how data and applications are protected on the cloud. The cloud is a major technology shift and hence there is an inevitable need to provide it with a strong authentication framework.

This course will show you how to protect your cloud applications from costly security breaches. You will learn to overcome cloud infrastructure security challenges, implement business continuity and disaster recovery planning, and apply a variety of approaches to encrypting your data. You will also learn to perform security testing of the applications hosted on cloud services, and various security solutions to secure your application data on the cloud.

By the end of this video course, take your knowledge to the next level by learning to protect your business-critical applications from external and internal threats throughout their entire life cycle, from design to implementation to production.

This course is packed with interesting and real-time examples with clear explanations. With lots of hands-on instructions, this course covers security challenges in the cloud, underlying infrastructure security testing, application security testing, and cloud application architecture security—all the material have been split into small chunks, to help you learn each part individually at your own pace.

What You Will Learn

  • Tackle security challenges related to cloud applications.
  • Manage various cloud delivery and deployment models.
  • Secure data on the cloud by mastering business continuity and disaster recovery planning.
  • Eliminate the risks associated with cloud infrastructure by performing VAPT.
  • Integrate security in software development life cycles.
  • Perform security testing of cloud applications using SAST/DAST tools and manual penetration testing.
  • Secure your cloud infrastructure using various security solutions such as WAF, DAM, SSL, TLS, and more.
Table of Contents

Cloud Security Challenges
1 The Course Overview
2 Security Challenges in the Cloud
3 Cloud Delivery models – SaaS, PaaS, and IaaS
4 Cloud Deployment types – Public, Private, and Hybrid
5 Security Concepts Relevant to Cloud

Design Principles of a Secure Cloud
6 Business Continuity and Disaster Recovery Planning
7 Understand Cloud Data Lifecycle
8 Encryption Types and Availability

Cloud Platform and Infrastructure Security
9 Analyze Risks Associated to Cloud Infrastructure
10 Network and Virtualization Security
11 Infrastructure Security Testing
12 Network VAPT

Cloud Application Security
13 Understand Software Development Lifecycle (SDLC) Process
14 Comprehend Common Vulnerabilities – OWASP Top 10
15 SAST
16 DAST
17 Apply Security in SDLC
18 Pen Testing

Securing Cloud Application Architectures
19 Security Devices – WAF
20 Security Devices – DAM
21 Cryptography – TLS, SSL