Creator: University of Minnesota
Category: Software > Computer Software > Educational Software
Topic: Information Technology, Security
Tag: authentication, Cloud, Data, monitoring, risks
Availability: In stock
Price: USD 49.00
After completing the course, the student should be able to do the following: Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
‘ Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.