YoVDO

Ethical Hacking: Cloud Computing

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses Cloud Computing Courses Penetration Testing Courses Encryption Courses Cloud Security Courses Identity Management Courses High Availability Courses

Course Description

Overview

Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.

Syllabus

Introduction
  • Get prepped for ethical hacking cloud computing certification
  • What you should know
1. Cloud Overview
  • Cloud computing characteristics and security
  • Cloud deployment and service models
  • Cloud services and the hacking process
  • Common cloud computing threats
2. Cloud Identity Management
  • Cloud identity management
  • Create cloud users and groups
  • Enable MFA for cloud users
  • Azure resource permissions
  • AWS resource permissions
3. Cloud High Availability
  • Cloud service high availability
  • Cloud security recommendation tools
  • Deploying cloud firewall solutions
  • Cloud data residency
  • Cloud storage replication
  • Cloud virtual machine replication
  • Configure cloud load balancing
  • Application containers and clusters
4. Hardening the Cloud
  • Cloud auditing
  • Enable cloud alert notification
  • Encryption and the cloud
  • Force HTTPS for cloud-hosted web applications
  • Deploying a cloud jump box
  • Cloud artificial intelligence and machine learning
  • Cloud DDoS protection
  • Pen testing and the cloud
  • Cloud hacking tools
  • Cloud security best practices
Conclusion
  • Next steps

Taught by

Daniel Lachance

Related Courses

Optimizing Microsoft Windows Server Storage
Microsoft via edX
High Availability and Disaster Recovery with the SAP HANA Platform
SAP Learning
Microsoft Exchange Server 2016 - 3: Mailbox Databases
Microsoft via edX
Microsoft SharePoint 2016: Workload Optimization
Microsoft via edX
Microsoft Azure Virtual Machines
Microsoft via edX