This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques.
Cloud Security Basics
This course is part of Cybersecurity in the Cloud Specialization
Instructor: Rick Smith
Sponsored by Louisiana Workforce Commission
16,589 already enrolled
(101 reviews)
What you'll learn
Design a simple cloud service and select appropriate security measures to protect it.
Associate user roles with appropriate entities deploying or using a cloud service.
Assess levels of risk and recent vulnerabilities that apply to cloud services.
Learn and apply basic network security techniques in the cloud environment.
Skills you'll gain
Details to know
Add to your LinkedIn profile
15 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
Here we introduce Internet server security in six steps, covering the first three in detail.
What's included
12 videos4 readings5 assignments1 peer review1 discussion prompt
We examine techniques to control how different hosts interact within a network.
What's included
7 videos3 assignments1 peer review1 discussion prompt
Modern systems rarely reside inside a single trust boundary. We use cryptography to protect information when it travels outside our trust boundary.
What's included
15 videos1 reading5 assignments1 peer review1 discussion prompt
The public cloud provides both operational benefits and security challenges. We use concepts from the earlier modules to address cloud security challenges.
What's included
8 videos1 reading2 assignments1 peer review
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
101 reviews
- 5 stars
64.35%
- 4 stars
20.79%
- 3 stars
5.94%
- 2 stars
2.97%
- 1 star
5.94%
Showing 3 of 101
Reviewed on May 16, 2021
It's very good course to learn basics of cloud security. Easy to understand and very insightful.
Reviewed on Jun 18, 2020
Amazing course with the best instructor.
Reviewed on Feb 7, 2022
Please dont ive Peer grade assignment rather quiz are better
Recommended if you're interested in Information Technology
- Status: [object Object]
Google Cloud
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy