Provided by Vertical Structure
Introduction
Microservices and Serverless
Securing Infrastructure
Finding Vulnerabilities
Logging
Tools to help
Authentication & Authorisation
Threat modelling serverless applications