Application Development for Cloud Computing


          Start Today!

          Add to cart

          Professional Credits:

          CEU: 0.5
          ATD CI: 5
          HRCI: 5
          PDU: 5
          SHRM: 5


          Start Today!

          Add to cart

          Completion Time

          5 hours

          Access Time

          90 Days


          Individual Skill Course



          Training Level


          Delivery Information:

          Online Asynchronous Self-paced


          This training course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications. It is not a software engineering course and does not require any programming knowledge. The content of this course covers much of the Application Security domain developed by the (ISC)2 and Cloud Security Alliance as part of the Cloud Computing Security Practitioner (CCSP) exam and certification. Further, the course also incorporates content that may be found on the CompTIA Cloud+ exam. As such, it should serve as useful preparation for anyone pursuing these certifications.

          Learning Outcomes

          After completing this course, the learner should be able to:
          • Define the basic characteristics of an algorithm.
          • Differentiate among the different kinds of software that comprise modern applications.
          • Describe the different stages of the software development life cycle (SDLC) and how they change for cloud computing.
          • Identify different programming concepts.
          • Contrast the concept of object-oriented programming to procedural programming.
          • Describe various vulnerabilities found in applications.
          • Describe how cloud service categories impact the responsibilities of both providers and consumers.
          • Define the role of identity and access management in cloud applications.
          • Explain shared responsibilities for cloud computing.
          • Differentiate among the different means of authentication.
          • Enumerate different mitigation strategies for certain threats to cloud applications.
          • Illustrate how Shadow IT applications impact corporate security.


          Start Today!
          Add to cart