Free Premium Courses
Home » Posts » Ethical Hacking: Cloud Computing

Ethical Hacking: Cloud Computing

Description

Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, instructor Daniel Lachance explores how many types of resources including virtual machines, databases, and storage can be deployed in a cloud computing environment.

Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common breaches and security threats that can affect overall cloud security.

He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, test-taking strategies, and much more.

Add comment

Advertisement

Categories

Email Newsletter

Subscribe to receive latest articles, tutorials, and ideas in your inbox.

Advertisement

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Newsletter
Subscribe to our newsletter to get the latest updates
Subscribe Newsletter
Subscribe to our newsletter to get the latest updates
Thank You
You are now Subscribed to our newsletter.
Thank You
You are now Subscribed to our newsletter.