Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.
Overview
Syllabus
Introduction
- Get prepped for ethical hacking cloud computing certification
- What you should know
- Cloud computing characteristics and security
- Cloud deployment and service models
- Cloud services and the hacking process
- Common cloud computing threats
- Cloud identity management
- Create cloud users and groups
- Enable MFA for cloud users
- Azure resource permissions
- AWS resource permissions
- Cloud service high availability
- Cloud security recommendation tools
- Deploying cloud firewall solutions
- Cloud data residency
- Cloud storage replication
- Cloud virtual machine replication
- Configure cloud load balancing
- Application containers and clusters
- Cloud auditing
- Enable cloud alert notification
- Encryption and the cloud
- Force HTTPS for cloud-hosted web applications
- Deploying a cloud jump box
- Cloud artificial intelligence and machine learning
- Cloud DDoS protection
- Pen testing and the cloud
- Cloud hacking tools
- Cloud security best practices
- Next steps
Taught by
Daniel Lachance