Overview
This course covers the top 10 security issues in serverless computing. By the end of the course, learners will be able to identify and address common security vulnerabilities in serverless applications. The course teaches skills such as recognizing event injection, broken authentication, sensitive data exposure, XML external entity, broken access control, security misconfiguration, cross-site scripting, insecure deserialization, and insufficient logging & monitoring. The teaching method involves video lectures. This course is intended for individuals interested in serverless computing and cloud security.
Syllabus
Intro
The Evolution of the Cloud
Event Injection
Broken Authentication
SLS3: Sensitive Data Exposure
XML External Entity
Broken Access Control
Security Misconfiguration
Cross-Site Scripting • More incoming entry points - MQTT, SES, SNS
Insecure Deserialization
Insufficient Logging & Monitoring
Want to learn more?