- Career Building
- Computer Applications
- Creativity & Innovation
- Cybersecurity & CISSP
- Data Management & Analytics
- Emerging Technologies
- Events and Community
- Human Resources
- International Trade
- Modern Languages
- Nonprofit Management
- Personal & Professional Development
- Project Management and Agile
- Six Sigma & Lean
- Small Business Management
- Sustainable Management
- Web Design
- Women in Business
Application Development for Cloud Computing
This course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications. It is not a software engineering course and does not require any programming knowledge. The content of this course covers much of the Application Security domain developed by the (ISC)2 and Cloud Security Alliance as part of the Cloud Computing Security Practitioner (CCSP) exam and certification. Further, the course also incorporates content that may be found on the CompTIA Cloud+ exam. As such, it should serve as useful preparation for anyone pursuing these certifications.
After completing this course, the learner should be able to:
- Define the basic characteristics of an algorithm.
- Differentiate among the different kinds of software that comprise modern applications.
- Describe the different stages of the software development life cycle (SDLC) and how they change for cloud computing.
- Identify different programming concepts.
- Contrast the concept of object-oriented programming to procedural programming.
- Describe various vulnerabilities found in applications.
- Describe how cloud service categories impact the responsibilities of both providers and consumers.
- Define the role of identity and access management in cloud applications.
- Explain shared responsibilities for cloud computing.
- Differentiate among the different means of authentication.
- Enumerate different mitigation strategies for certain threats to cloud applications.
- Illustrate how Shadow IT applications impact corporate security.