Serverless computing has redefined how companies build, consume, and integrate cloud-native applications. This course introduces the best-practices developers, and cloud customers should follow when using a serverless architecture. Learners will develop an understanding of the fundamental technologies serverless architectures use and how they should be secured from a development perspective to protect against the most common threats to serverless environments today.
On successful completion of this course, learners should have the knowledge and skills required to:
- Identify Key Components
- Secure the API Entry Point, Runtime Environment, and Data Storage
- Identify a reliable and secure cloud provider
- Account for cloud provider considerations