Ethical Hacking: Cloud Computing
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.
Syllabus
Introduction
- Get prepped for ethical hacking cloud computing certification
- What you should know
- Cloud computing characteristics and security
- Cloud deployment and service models
- Cloud services and the hacking process
- Common cloud computing threats
- Cloud identity management
- Create cloud users and groups
- Enable MFA for cloud users
- Azure resource permissions
- AWS resource permissions
- Cloud service high availability
- Cloud security recommendation tools
- Deploying cloud firewall solutions
- Cloud data residency
- Cloud storage replication
- Cloud virtual machine replication
- Configure cloud load balancing
- Application containers and clusters
- Cloud auditing
- Enable cloud alert notification
- Encryption and the cloud
- Force HTTPS for cloud-hosted web applications
- Deploying a cloud jump box
- Cloud artificial intelligence and machine learning
- Cloud DDoS protection
- Pen testing and the cloud
- Cloud hacking tools
- Cloud security best practices
- Next steps
Taught by
Daniel Lachance
Related Courses
Office 365: Managing Identities and ServicesMicrosoft via edX Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms Introduction to Microsoft Azure
Microsoft via edX Manage Office 365 Identities
Microsoft via edX