Chevron Left
Volver a Cloud Top Ten Risks

Opiniones y comentarios de aprendices correspondientes a Cloud Top Ten Risks por parte de Universidad de Minnesota

Acerca del Curso

After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring....

Principales reseñas

Filtrar por:

1 - 2 de 2 revisiones para Cloud Top Ten Risks

por Vijayendra R

28 de jul. de 2021

Course was excellent and explanations with examples were useful.

por RIDDHI T

11 de may. de 2021

I did not get interesting or innovative stuff in this course. I was expecting that this course can be a good foundation for research in cloud security.