Securing Applications on the Cloud
4.0 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
69 students enrolled

Securing Applications on the Cloud

A practical guide for Security Professionals
4.0 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
69 students enrolled
Created by Packt Publishing
Last updated 11/2018
English
English [Auto]
Current price: $86.99 Original price: $124.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Tackle security challenges related to cloud applications.
  • Manage various cloud delivery and deployment models.
  • Secure data on the cloud by mastering business continuity and disaster recovery planning.
  • Eliminate the risks associated with cloud infrastructure by performing VAPT.
  • Integrate security in software development life cycles.
  • Perform security testing of cloud applications using SAST/DAST tools and manual penetration testing.
  • Secure your cloud infrastructure using various security solutions such as WAF, DAM, SSL, TLS, and more.
Course content
Expand all 21 lectures 02:08:06
+ Cloud Security Challenges
5 lectures 23:44

This video provides an overview of the entire course.

Preview 03:12

The aim of this video is to look at the security challenges in the cloud.

   •  Get introduced to the security challenges

   •  Explore the categories of challenges

Security Challenges in the Cloud
04:16

The aim of this video is to learn about the cloud delivery models.

   •  Explore Infrastructure as a Service (IaaS)

   •  Explore Platform as a Service (PaaS)

   •  Explore Software as a Service (SaaS)

Cloud Delivery models – SaaS, PaaS, and IaaS
06:06

The aim of this video is to learn about the cloud deployment types.

   •  Explore public cloud

   •  Explore private cloud

   •  Explore hybrid cloud

Cloud Deployment types – Public, Private, and Hybrid
04:55

The aim of this video is to learn security concepts.

   •  Learn about governance controls

   •  Learn about operational controls

Security Concepts Relevant to Cloud
05:15
+ Design Principles of a Secure Cloud
3 lectures 15:15

The aim of this video is to learn about business continuity and disaster recovery planning.

   •  Get introduced to the business continuity and disaster recovery planning

   •  Explore wrong assumptions about cloud

   •  Learn the planning and best practices to leverage cloud for BC/DR

Preview 05:26

The aim of this video is to learn about the cloud data lifecycle.

   •  Learn the lifecycle

   •  Learn the different phases of the lifecycle

Understand Cloud Data Lifecycle
05:01

The aim of this video is to learn about the encryption types and availability.

   •  Get introduced to the encryption types

   •  Learn the encryption tips to lock data on cloud

   •  Explore examples of encryption algorithms

Encryption Types and Availability
04:48
+ Cloud Platform and Infrastructure Security
4 lectures 31:47

The aim of this video is to analyze risks associated to cloud infrastructure.

   •  Get an overview of cloud infrastructure

   •  Learn how security changes with cloud networking

   •  Study the other threats related to cloud computing

Preview 05:39

The aim of this video is to learn about the network and virtualization security.

   •  Know the virtualization concerns

   •  Learn the security for different cloud categories

   •  Learn the best practices for cloud security

Network and Virtualization Security
08:10

Get to know about infrastructure security testing with this video.

   •  Learn about White Box Testing

   •  Learn about Black Box Testing

   •  Study about VA/PT Tools

Infrastructure Security Testing
04:32

The aim of this video is to learn about the Network VAPT in terms of practicals.

   •  Perform VAPT for the server

Network VAPT
13:26
+ Cloud Application Security
6 lectures 34:27

The aim of this video is to understand the SDLC process.

   •  Define SDLC

   •  Explore software development models

   •  Learn the stages in SDLC

Understand Software Development Lifecycle (SDLC) Process
05:09

The aim of this video is to learn about comprehending the common vulnerabilities.

   •  Get to know what Is OWASP

   •  Learn what OWASP Top 10 refers to

   •  Take a look at the OWASP Testing Guide

Comprehend Common Vulnerabilities – OWASP Top 10
06:53

The aim of this video is to learn about Static Application Security Testing.

   •  Get to know what Is SAST

   •  Explore the benefits of SAST

   •  Take a look at the list of SAST Tools

SAST
03:40

The aim of this video is to learn about Dynamic Application Security Testing.

   •  Get to know what Is DAST

   •  Explore the benefits of DAST and take a look at the list of DAST tools

   •  Differentiate between SAST and DAST

DAST
05:02

The aim of this video is to learn about security in SDLC.

   •  Explore security in SDLC

Apply Security in SDLC
10:40

The aim of this video is to learn about pen testing.

   •  Explore pen testing in detail

   •  Learn pen testing for applications hosted on cloud

Pen Testing
03:03
+ Securing Cloud Application Architectures
3 lectures 22:53

The aim of this video is to learn about Web Application Firewall.

   •  Explore WAF in detail and know its features and functionality

   •  Explore in detail the deployment options

   •  Get to know more about the operating modes

Security Devices – WAF
09:20

The aim of this video is to learn about Database Activity Monitoring.

   •  Define DAM

   •  Explore the features of DAM

   •  Learn the collection techniques and use cases

Security Devices – DAM
09:01

The aim of this video is to learn about cryptography.

   •  Get introduced to cryptography

   •  Learn about SSL and TLS

   •  Study the advantages of implementing SSL

Cryptography – TLS, SSL
04:32
Requirements
  • This course assumes you are already familiar with basic security practices and are ready to focus on cloud-specific issues.
Description

When organizations move applications to the cloud they increase their security risks. As a cloud security professional, you have to implement more security controls over how data and applications are protected on the cloud. The cloud is a major technology shift and hence there is an inevitable need to provide it with a strong authentication framework.

This course will show you how to protect your cloud applications from costly security breaches. You will learn to overcome cloud infrastructure security challenges, implement business continuity and disaster recovery planning, and apply a variety of approaches to encrypting your data. You will also learn to perform security testing of the applications hosted on cloud services, and various security solutions to secure your application data on the cloud.

By the end of this video course, take your knowledge to the next level by learning to protect your business-critical applications from external and internal threats throughout their entire life cycle, from design to implementation to production.

About the Author

Tajinder Kalsi is an innovative professional with more than 9 years' progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment. At present, he is working as an information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant-cum-technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, in more than 125 colleges; he has spoken to 10,000+ students. Tajinder is a certified ISO 27001:2013 Auditor. Tajinder authored Practical Linux Security Cookbook published by Packt Publishing. He has also reviewed the following books: Web Application Penetration Testing with Kali Linux and Mastering Kali Linux for Advanced Penetration Testing. He has also authored three video courses with Packt: Getting Started with Pentensing, Finding and Exploiting Hidden Vulnerabilities, and Pentesting Web Applications. He is best described as dedicated, devoted, and determined and a person who strongly believes in making his dreams come true. He defines himself as a tireless worker, who loves to laugh and make others laugh. He is also very friendly and level-headed.

Who this course is for:
  • This course is for IT security professionals who are involved with IT architecture security and web application and cloud security. Anyone who needs to keep cloud applications secure will benefit from this course.