Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Provider Logo

Ethical Hacking: Cloud Computing

via LinkedIn Learning

Overview

Learn how to evaluate and harden cloud-deployed resources as you study for version 10 of the Certified Ethical Hacker (CEH) exam.

Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more.

Syllabus

Introduction
  • Get prepped for ethical hacking cloud computing certification
  • What you should know
1. Cloud Overview
  • Cloud computing characteristics and security
  • Cloud deployment and service models
  • Cloud services and the hacking process
  • Common cloud computing threats
2. Cloud Identity Management
  • Cloud identity management
  • Create cloud users and groups
  • Enable MFA for cloud users
  • Cloud resource permissions: RBAC and policies
3. Cloud High Availability
  • Cloud service high availability
  • Cloud security recommendation tools
  • Deploying cloud firewall solutions
  • Cloud data residency
  • Cloud storage replication
  • Cloud virtual machine replication
  • Configure cloud load balancing
4. Hardening the Cloud
  • Cloud auditing
  • Enable cloud alert notification
  • Encryption and the cloud
  • Force HTTPS for cloud-hosted web applications
  • Deploying a cloud jump box
  • Cloud artificial intelligence and machine learning
  • Cloud DDoS protection
  • Pen testing and the cloud
  • Cloud security tools
Conclusion
  • Next steps

Taught by

Daniel Lachance

Related Courses

Reviews

0.0 rating, based on 0 reviews

Start your review of Ethical Hacking: Cloud Computing

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free