Back to Cloud Top Ten Risks
Learner Reviews & Feedback for Cloud Top Ten Risks by University of Minnesota
26 ratings
About the Course
After completing the course, the student should be able to do the following:
鈼 Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks.
鈼 Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data.
鈼 Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks.
鈼 Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
Top reviews
Filter by:
1 - 4 of 4 Reviews for Cloud Top Ten Risks
By Vijayendra R
鈥Jul 28, 2021
Course was excellent and explanations with examples were useful.
By Junaid M
鈥Nov 2, 2022
awesome
By NIKIL V
鈥Mar 27, 2025
Good
By RIDDHI T
鈥May 11, 2021
I did not get interesting or innovative stuff in this course. I was expecting that this course can be a good foundation for research in cloud security.