Top Threats

Top Threats

Learn about the top 11 cloud computing issues related to threats and vulnerabilities, cloud threat modeling techniques, and cloud risk treatment techniques.

rate limit

Code not recognized.

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.



This self-paced course provides an introduction to top threats in cloud computing. It covers foundational topics such as background on the cloud threats, identifies and describes the top 11 cloud computing issues, describes techniques to model cloud threats, and provides a risk treatment approach to reduce cloud adoption risks. Additionally, this course provides diagrams, explanations, and references to facilitate the learning process.

After completing this course, learners will be able to:

  • Understand the background and context of cloud threats
  • Explain cloud security and compliance, business drivers and objectives
  • Identify and describe the top 11 threats to cloud computing 
  • Describe threat modeling and its objectives
  • Describe cloud vulnerabilities and the evolution from on-premises to the cloud
  • Describe cloud risk, mitigation, and lessons learned

This course is a great fit for anyone in the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers



For more information regarding the calculation of course length and Continuing Educational Credits, please refer to our
FAQ.

Curriculum

  • Background & Context of Top Threats
  • Top Threats
  • Cloud Risk & Mitigation
  • Top Threats to Cloud Computing
  • Cloud Vulnerabilities
  • Course Survey

About this course

Purchase of your Knowledge Center course ensures access to the material for up to one year from the date of purchase. This course is estimated to take about 1 hour to complete. After completion, you will receive a certificate for 1 course hour(s) that may be submitted for possible Continuing Educational Credits.



This self-paced course provides an introduction to top threats in cloud computing. It covers foundational topics such as background on the cloud threats, identifies and describes the top 11 cloud computing issues, describes techniques to model cloud threats, and provides a risk treatment approach to reduce cloud adoption risks. Additionally, this course provides diagrams, explanations, and references to facilitate the learning process.

After completing this course, learners will be able to:

  • Understand the background and context of cloud threats
  • Explain cloud security and compliance, business drivers and objectives
  • Identify and describe the top 11 threats to cloud computing 
  • Describe threat modeling and its objectives
  • Describe cloud vulnerabilities and the evolution from on-premises to the cloud
  • Describe cloud risk, mitigation, and lessons learned

This course is a great fit for anyone in the following roles:

  • C-Suite (CEO, CTO, CISO, CIO)
  • Managers and Decision Makers
  • Cybersecurity Analysts
  • Security Engineers and Architects
  • Enterprise Architects
  • Security Administrators
  • Compliance Managers
  • Systems Engineers
  • Developers



For more information regarding the calculation of course length and Continuing Educational Credits, please refer to our
FAQ.

Curriculum

  • Background & Context of Top Threats
  • Top Threats
  • Cloud Risk & Mitigation
  • Top Threats to Cloud Computing
  • Cloud Vulnerabilities
  • Course Survey