Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Serverless Security Top 10

via YouTube

Overview

This course covers the top 10 security issues in serverless computing. By the end of the course, learners will be able to identify and address common security vulnerabilities in serverless applications. The course teaches skills such as recognizing event injection, broken authentication, sensitive data exposure, XML external entity, broken access control, security misconfiguration, cross-site scripting, insecure deserialization, and insufficient logging & monitoring. The teaching method involves video lectures. This course is intended for individuals interested in serverless computing and cloud security.

Syllabus

Intro
The Evolution of the Cloud
Event Injection
Broken Authentication
SLS3: Sensitive Data Exposure
XML External Entity
Broken Access Control
Security Misconfiguration
Cross-Site Scripting • More incoming entry points - MQTT, SES, SNS
Insecure Deserialization
Insufficient Logging & Monitoring
Want to learn more?

Reviews

Start your review of Serverless Security Top 10

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.