Application Security In The Cloud
CL-CLS
Onsite / Virtual classroom
3
days
Ends with an exam
Audience:
Developers, Managers, Professionals
Preparedness:
Cloud computing, software development
Exercises:
Hands-on
Upcoming dates:

Stay tuned for more!

Course description

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different than general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Outline:
  • IT security and secure coding
  • Cloud security basics
  • Threats and risks in the clouds
  • Cloud security solutions
  • Practical cryptography
  • Web application security
  • Denial of service
  • Input validation
  • Data security in the cloud
  • Security audit in the cloud
  • Dynamic security testing
  • Securing the cloud environment
  • Knowledge sources

Participants attending this course will:
  • Understand basic concepts of security, IT security and secure coding
  • Understand major threats and risks in the cloud domain
  • Learn about elementary cloud security solutions
  • Understand security concepts of Web services
  • Learn about XML security
  • Have a practical understanding of cryptography
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn about denial of service attacks and protections
  • Learn typical input validation mistakes
  • Understand data security challenges in the cloud
  • Learn about NoSQL security
  • Learn about MongoDB security
  • Understand the challenges of auditing and evaluating cloud systems for security
  • Learn how to secure the cloud environment and infrastructure
  • Learn how to set up and operate the deployment environment securely
  • Get sources and further readings on secure coding practices
AI Security
Go and Web Application Security
Application Security In The Cloud
Web Application Security Testing
Crypto Library Programming and the PKI
Advanced TPM Security
Web Application Security
C# and Web Application Secuity
Java and Web Application Security
C and C++ Secure Coding (x86)
C and C++ Secure Coding (ARM)
OWASP TOP 10, Secure Coding Fundamentals
AI for Software Developers
AI Fundamentals
Train the Trainer - Fundamentals

Our students say:

"The trainer has a wealth of experience in the area that the course covers. It has proved helpful in providing actual examples."

January 30, 2023

"The training material was updated with the latests technologies. Very clear subjects on different aspects of web security..."

November 7, 2022

"The course opened my eyes to vulnerabilities that are quite commonly available."

June 3, 2022
Structured
flexibility
Proven model
Just in time
learning
World-class
trainers
Global trainer
alumni
network
Win together,
don’t lose
alone.
Request information
Fill out the form for personalized assistance and discover how our training programs can transform your career path.
We appreciate your interest and will get back to you shortly with all the information you need!
Oops! Something went wrong while submitting the form.
Please try again!