Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Cloud Computing

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.

Syllabus

Introduction
  • Get prepped for ethical hacking cloud computing certification
  • What you should know
1. Cloud Overview
  • Cloud computing characteristics and security
  • Cloud deployment and service models
  • Cloud services and the hacking process
  • Common cloud computing threats
2. Cloud Identity Management
  • Cloud identity management
  • Create cloud users and groups
  • Enable MFA for cloud users
  • Azure resource permissions
  • AWS resource permissions
3. Cloud High Availability
  • Cloud service high availability
  • Cloud security recommendation tools
  • Deploying cloud firewall solutions
  • Cloud data residency
  • Cloud storage replication
  • Cloud virtual machine replication
  • Configure cloud load balancing
  • Application containers and clusters
4. Hardening the Cloud
  • Cloud auditing
  • Enable cloud alert notification
  • Encryption and the cloud
  • Force HTTPS for cloud-hosted web applications
  • Deploying a cloud jump box
  • Cloud artificial intelligence and machine learning
  • Cloud DDoS protection
  • Pen testing and the cloud
  • Cloud hacking tools
  • Cloud security best practices
Conclusion
  • Next steps

Taught by

Daniel Lachance

Reviews

4.7 rating at LinkedIn Learning based on 49 ratings

Start your review of Ethical Hacking: Cloud Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.