Ethical Hacking: Cloud Computing
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.
Syllabus
Introduction
- Get prepped for ethical hacking cloud computing certification
- What you should know
- Cloud computing characteristics and security
- Cloud deployment and service models
- Cloud services and the hacking process
- Common cloud computing threats
- Cloud identity management
- Create cloud users and groups
- Enable MFA for cloud users
- Azure resource permissions
- AWS resource permissions
- Cloud service high availability
- Cloud security recommendation tools
- Deploying cloud firewall solutions
- Cloud data residency
- Cloud storage replication
- Cloud virtual machine replication
- Configure cloud load balancing
- Application containers and clusters
- Cloud auditing
- Enable cloud alert notification
- Encryption and the cloud
- Force HTTPS for cloud-hosted web applications
- Deploying a cloud jump box
- Cloud artificial intelligence and machine learning
- Cloud DDoS protection
- Pen testing and the cloud
- Cloud hacking tools
- Cloud security best practices
- Next steps
Taught by
Daniel Lachance
Related Courses
Optimizing Microsoft Windows Server StorageMicrosoft via edX High Availability and Disaster Recovery with the SAP HANA Platform
SAP Learning Microsoft Exchange Server 2016 - 3: Mailbox Databases
Microsoft via edX Microsoft SharePoint 2016: Workload Optimization
Microsoft via edX Microsoft Azure Virtual Machines
Microsoft via edX