• Online, Self-Paced
Course Description

Serverless computing has redefined how companies build, consume, and integrate cloud-native applications. This course introduces the best-practices developers, and cloud customers should follow when using a serverless architecture. Learners will develop an understanding of the fundamental technologies serverless architectures use and how they should be secured from a development perspective to protect against the most common threats to serverless environments today.

Learning Objectives


On successful completion of this course, learners should have the knowledge and skills required to:

  • Identify Key Components
  • Secure the API Entry Point, Runtime Environment, and Data Storage
  • Identify a reliable and secure cloud provider
  • Account for cloud provider considerations

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.