- Multi-Factor Authentication
- Infrastructure as Code (IaC)
- Authorization (Computing)
- Data Governance
- Role-Based Access Control (RBAC)
- Personally Identifiable Information
- Threat Management
- Authentications
- Cloud Computing
- Cloud Security
- Data Security
- Infrastructure Security
Cloud Security Risks: Identify and Protect Against Threats
Completed by Martin Ballester
August 2, 2024
28 hours (approximately)
Martin Ballester's account is verified. Coursera certifies their successful completion of Cloud Security Risks: Identify and Protect Against Threats
What you will learn
Describe fundamental identity and access management concepts specific to the cloud.
Identify key components of AAA (Authentication, Authorization, Auditing) for strengthened cloud security.
Explain capabilities and best practices for efficient asset and resource management in the cloud.
Explore common security vulnerabilities and evaluate their impact and risk mitigation strategies.
Skills you will gain

