• Online, Self-Paced
Course Description

The CSA Top 11 Threats to Cloud Computing provides guidelines on what secure practices organizations should focus on when planning and establishing cloud environments. Naturally, as more and more organizations deploy cloud-based solutions, new security risks and challenges are introduced. This course provides an understanding of cloud-based security threats organizations should consider and focuses on unique mitigation strategies that should be explored when using a cloud-based infrastructure.

Learning Objectives

Upon successful completion of this course, learners will understand:

  • The purpose and scope of the CSA Top 11 Threats to Cloud Computing
  • The unique risks and attack vectors of cloud environments
  • Best practices for secure coding to mitigate common cloud vulnerabilities
  • How to eliminate or mitigate these vulnerabilities

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas