YoVDO

Ethical Hacking: Cloud Computing

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses Cloud Computing Courses Penetration Testing Courses Encryption Courses Cloud Security Courses Identity Management Courses High Availability Courses

Course Description

Overview

Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.

Syllabus

Introduction
  • Get prepped for ethical hacking cloud computing certification
  • What you should know
1. Cloud Overview
  • Cloud computing characteristics and security
  • Cloud deployment and service models
  • Cloud services and the hacking process
  • Common cloud computing threats
2. Cloud Identity Management
  • Cloud identity management
  • Create cloud users and groups
  • Enable MFA for cloud users
  • Azure resource permissions
  • AWS resource permissions
3. Cloud High Availability
  • Cloud service high availability
  • Cloud security recommendation tools
  • Deploying cloud firewall solutions
  • Cloud data residency
  • Cloud storage replication
  • Cloud virtual machine replication
  • Configure cloud load balancing
  • Application containers and clusters
4. Hardening the Cloud
  • Cloud auditing
  • Enable cloud alert notification
  • Encryption and the cloud
  • Force HTTPS for cloud-hosted web applications
  • Deploying a cloud jump box
  • Cloud artificial intelligence and machine learning
  • Cloud DDoS protection
  • Pen testing and the cloud
  • Cloud hacking tools
  • Cloud security best practices
Conclusion
  • Next steps

Taught by

Daniel Lachance

Related Courses

Office 365: Managing Identities and Services
Microsoft via edX
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms
Introduction to Microsoft Azure
Microsoft via edX
Manage Office 365 Identities
Microsoft via edX