Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Cloud Computing

via LinkedIn Learning

Overview

Learn how to evaluate and harden cloud-deployed resources as you study for version 10 of the Certified Ethical Hacker (CEH) exam.

Syllabus

Introduction
  • Get prepped for ethical hacking cloud computing certification
  • What you should know
1. Cloud Overview
  • Cloud computing characteristics and security
  • Cloud deployment and service models
  • Cloud services and the hacking process
  • Common cloud computing threats
2. Cloud Identity Management
  • Cloud identity management
  • Create cloud users and groups
  • Enable MFA for cloud users
  • Cloud resource permissions: RBAC and policies
3. Cloud High Availability
  • Cloud service high availability
  • Cloud security recommendation tools
  • Deploying cloud firewall solutions
  • Cloud data residency
  • Cloud storage replication
  • Cloud virtual machine replication
  • Configure cloud load balancing
4. Hardening the Cloud
  • Cloud auditing
  • Enable cloud alert notification
  • Encryption and the cloud
  • Force HTTPS for cloud-hosted web applications
  • Deploying a cloud jump box
  • Cloud artificial intelligence and machine learning
  • Cloud DDoS protection
  • Pen testing and the cloud
  • Cloud security tools
Conclusion
  • Next steps

Taught by

Daniel Lachance

Reviews

4.6 rating at LinkedIn Learning based on 66 ratings

Start your review of Ethical Hacking: Cloud Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.