Application Security in the Cloud (in company)

Type product
Tijdsduur

Application Security in the Cloud (in company)

NobleProg Nederland
Logo van NobleProg Nederland

Tip: incompany training nodig? Vraag een offerte aan bij meerdere aanbieders!

Beschrijving

Overview

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basic…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Google Cloud, Cloud Computing, VMware vCloud, MCSE Cloud en Kubernetes.

Overview

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Participants attending this course will

  • Understand basic concepts of security, IT security and secure coding
  • Understand major threats and risks in the cloud domain
  • Learn about elementary cloud security solutions
  • Get information about the trust and the governance regarding the cloud
  • Have a practical understanding of cryptography
  • Get extensive knowledge in application security in the cloud
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Understand the challenges of auditing and evaluating cloud systems for security
  • Learn how to secure the cloud environment and infrastructure
  • Get sources and further readings on secure coding practices

Audience

Developers, Managers, Professionals

 

Course Outline

  • IT security and secure coding
  • Threats and risks in the clouds
  • Cloud security solutions
  • Trust and governance
  • Practical cryptography
  • Common implementation mistakes
  • Web application security
  • Security audit in the cloud
  • Securing the cloud environment
  • Data security in the cloud
  • Knowledge sources

.

Onze on line trainingen worden door een live instructeur verzorgd.

  • Onze DaDesktop® -technologie creeert een digitale leeromgeving (en indien nodig een geclusterde enterprise infrastructuur) waarmee opdrachten en oefeningen uitgevoerd kunnen worden.
  • De deelnemers (en de trainer) hebben toegang tot deze virtuele leeromgeving via de browser zodat hij/zij oefeningen kan doen die real time ingezien kunnen worden door de trainer.
  • De trainer monitort niet alleen de voortgang van de prakitische oefeningen maar kan ook te hulp schieten en ingrijpen mocht dat nodig zijn.
  • Onze remote trainingen verschillen niet van onze klassikale cursussen zowel qua duur, interactiviteit, praktische oefeningen als het cursusmateriaal.
  • Door de flexibiliteit in de trainingsopbouw, de hoge mate van interactie tussen trainer en deelnemer en de hands-on oefeningen zijn onze onlinetrainingen zeer efficiënte en effectief.
  • Ook onze in-company trainingen leveren wij on line met live instructeur.

NobleProg - The World’s Local Training Provider. Vraag vrijblijvend een offerte aan.

Er zijn nog geen ervaringen.

    Deel je ervaring

    Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

    Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.