Cloud attack vectors and remediations (knowing is half the battle, doing is the other!) Course
42 minutes
Course description
In this section, we will learn common attack vectors and how to remediate these issues. Knowing your own attack vectors is the first key in providing any level of security for an application. You cannot secure what you don’t know is there. This course will dive into the various attack vectors that are unique to the cloud and how to address each of these attack vectors to build the most secure app that you can.
Syllabus
OWASP Top Ten
Video - 00:09:00
In this video, we are going to go over the OWASP Top Ten.
Serverless attack vectors and remediations
Video - 00:14:00
In this video, we are going to go over serverless attack vectors.
Web application attack vectors and remediations
Video - 00:07:00
In this video, we are going to go over web application attack vectors.
Infrastructure attack vectors and remediations
Video - 00:10:00
In this video, we are going to go over infrastructure attack vectors.
Cloud attack vectors and remediations overview
Video - 00:01:00
In this video, we are going to review what will be covered in this course.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- Law Enforcement / Counterintelligence Forensics Analyst
- Cyber Defense Forensics Analyst
- Cyber Crime Investigator
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Award-winning training you can trust




