Providing Secure Cloud Applications

Cloud Computing is changing industries and careers. This course will train you to design secure cloud applications, how to successfully migrate legacy applications to the cloud, and how to securely operate in the cloud computing environment.
Course info
Level
Intermediate
Updated
Oct 11, 2018
Duration
2h 17m
Table of contents
Course Overview
Training Developers for the Cloud
Software Assurance and Validation
Using Verified Secure Software
Secure Software Implementation
Cloud Application Security Risks
Cloud Application Migration
Identity and Access Management Solutions
Auditing the Cloud
Cloud Business Continuity and Disaster Recovery
Description
Course info
Level
Intermediate
Updated
Oct 11, 2018
Duration
2h 17m
Description

Cloud computing has rocked every industry and has completely redefined enterprise information technology. Developers must now use DevSecOps, Serverless Computing, and Microservices to invent and deploy entirely new business models. In this course, Providing Secure Cloud Applications, you will learn how to do this in a secure manner. First, you will learn how to design a secure cloud application. Next, you will discover how to successfully migrate legacy applications to the cloud. Finally, you will explore how to securely operate in the cloud computing environment. When you have finished this course, you will be prepared to develop and deploy secure cloud applications that deliver true value to your organization.

About the author
About the author

Kevin L. Jackson is a globally recognized cloud computing thought leader and an (ISC)2 Certified Cloud Security Professional instructor.

More from the author
Designing the Physical Cloud
Advanced
1h 54m
Feb 15, 2019
Managing Data in the Cloud
Intermediate
2h 46m
May 18, 2018
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello. My name is Kevin L. Jackson, and welcome to Providing Secure Cloud Applications. I work with global corporations and national government entities as a brand ambassador, cloud computing and cybersecurity instructor, and management consultant. Developing and deploying secure cloud applications require a new approach to application development. Success depends on effective portfolio management, clearly linking organizational goals to cloud capabilities, and embracing constant change as normal. In this course, we are going to focus on how and why cloud apps differ from traditional enterprise applications. Topics we will cover include training developers, secure cloud app development, cloud app deployment, and cloud business continuity and disaster recovery. By the end of this course, you'll know how to design, develop, and deploy secure applications that deliver real value. For this course, you should be familiar with cloud computing service and deployment models, IT implementation options, and key data-centric security concepts. If you feel uncomfortable with these topics, please check out two of my other courses, Cloud Computing and the Security Challenge and Managing Data in the Cloud. Please join me on this journey toward providing secure cloud applications, at Pluralsight.