Providing Secure Cloud Applications

Cloud Computing is changing industries and careers. This course will train you to design secure cloud applications, how to successfully migrate legacy applications to the cloud, and how to securely operate in the cloud computing environment.
Course info
Level
Intermediate
Updated
Oct 11, 2018
Duration
2h 17m
Table of contents
Course Overview
Training Developers for the Cloud
Software Assurance and Validation
Using Verified Secure Software
Secure Software Implementation
Cloud Application Security Risks
Cloud Application Migration
Identity and Access Management Solutions
Auditing the Cloud
Cloud Business Continuity and Disaster Recovery
Description
Course info
Level
Intermediate
Updated
Oct 11, 2018
Duration
2h 17m
Description

Cloud computing has rocked every industry and has completely redefined enterprise information technology. Developers must now use DevSecOps, Serverless Computing, and Microservices to invent and deploy entirely new business models. In this course, Providing Secure Cloud Applications, you will learn how to do this in a secure manner. First, you will learn how to design a secure cloud application. Next, you will discover how to successfully migrate legacy applications to the cloud. Finally, you will explore how to securely operate in the cloud computing environment. When you have finished this course, you will be prepared to develop and deploy secure cloud applications that deliver true value to your organization.

About the author
About the author

Kevin L. Jackson is a globally recognized cloud computing thought leader and an (ISC)2 Certified Cloud Security Professional instructor.

More from the author
Managing Data in the Cloud
Intermediate
2h 45m
18 May 2018
Cloud Computing and the Security Challenge
Intermediate
2h 8m
29 Sep 2017