Design a simple cloud service and select appropriate security measures to protect it.
Associate user roles with appropriate entities deploying or using a cloud service.
Assess levels of risk and recent vulnerabilities that apply to cloud services.
Learn and apply basic network security techniques in the cloud environment.
This course introduces you to cybersecurity for the cloud. We’ll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques.
Here we introduce Internet server security in six steps, covering the first three in detail.
A Secure Network for a Private Cloud
We examine techniques to control how different hosts interact within a network.
Cryptography for Remote Access and Support
Modern systems rarely reside inside a single trust boundary. We use cryptography to protect information when it travels outside our trust boundary.
Step 6 and Cloud Security
The public cloud provides both operational benefits and security challenges. We use concepts from the earlier modules to address cloud security challenges.