This course introduces you to cybersecurity for the cloud. We'll learn and apply classic security techniques to today’s cloud security problems. We start with a deceptively simple and secure web service and address the problems arising as we improve it. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques.
-Here we introduce Internet server security in six steps, covering the first three in detail.
A Secure Network for a Private Cloud
-We examine techniques to control how different hosts interact within a network.
Cryptography for Remote Access and Support
-Modern systems rarely reside inside a single trust boundary. We use cryptography to protect information when it travels outside our trust boundary.
Step 6 and Cloud Security
-The public cloud provides both operational benefits and security challenges. We use concepts from the earlier modules to address cloud security challenges.