This course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications. It is not a software engineering course and does not require any programming knowledge. The content of this course covers much of the Application Security domain developed by the (ISC)2 and Cloud Security Alliance as part of the Cloud Computing Security Practitioner (CCSP) exam and certification. Further, the course also incorporates content that may be found on the CompTIA Cloud+ exam. As such, it should serve as useful preparation for anyone pursuing these certifications.
- Define the basic characteristics of an algorithm
- Differentiate among the different kinds of software that comprise modern applications
- Describe the different stages of the software development life cycle (SDLC) and how they change for cloud computing
- Identify different programming concepts
- Contrast the concept of object-oriented programming to procedural programming
- Describe various vulnerabilities found in applications
- Describe how cloud service categories impact the responsibilities of both providers and consumers
- Define the role of identity and access management in cloud applications.
- Explain shared responsibilities for cloud computing
- Differentiate among the different means of authentication
- Enumerate different mitigation strategies for certain threats to cloud applications.
- Illustrate how Shadow IT applications impact corporate security
PMI PDUs: 5Leadership PDUs: 1.75Strategic & Business Management PDUs: 0.75Technical PM PDUs: 2.5IACET CEUs: .5 (Contact Hours: 5 hours)HRCI Credits: 5 (Type: Specified - Strategic Business)SHRM PDCs: 5