Application Development for Cloud Computing
Application Development for Cloud Computing
Regular price
$808 USD
Regular price
Sale price
$808 USD
Unit price
per
Code in the clouds! Dive into development dynamics that define the digital skyline. From SaaS to PaaS, make your mark in the cyber sky. Code, cloud, create!
Course Duration:5 hours
Credits:
CEU Credits: 0.5
AMA PCM CEU Credits: 0
PDU Credits: 5
HRCI Credits: 5
SHRM Credits: 5
CFRE Credits: 0
ATD CI Credits: 5
ACE Credits: 0
Course Description
This course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications. It is not a software engineering course and does not require any programming knowledge. The content of this course covers much of the Application Security domain developed by the (ISC)2 and Cloud Security Alliance as part of the Cloud Computing Security Practitioner (CCSP) exam and certification. Further, the course also incorporates content that may be found on the CompTIA Cloud+ exam. As such, it should serve as useful preparation for anyone pursuing these certifications.
Learning Outcomes
Define the basic characteristics of an algorithm
Differentiate among the different kinds of software that comprise modern applications
Describe the different stages of the software development life cycle (SDLC) and how they change for cloud computing
Identify different programming concepts
Contrast the concept of object-oriented programming to procedural programming
Describe various vulnerabilities found in applications
Describe how cloud service categories impact the responsibilities of both providers and consumers
Define the role of identity and access management in cloud applications.
Explain shared responsibilities for cloud computing
Differentiate among the different means of authentication
Enumerate different mitigation strategies for certain threats to cloud applications.
Illustrate how Shadow IT applications impact corporate security