This course is part of the Ethical Hacking Series & looks at what changes with security in the cloud over traditional hosting models & much more. Start today!
Pluralsight is not an official partner or accredited training center of EC-Council. "The Cloud" is revolutionizing how we run software and services by providing low cost, flexible, and innovative alternatives to traditional hosting models. However, with the shift to cloud comes new security considerations. The cloud isn't more secure or less secure, rather it's differently secure; it strengthens security profiles in many areas whilst presenting new risks in others. Then again, many of the traditional risks in software don't change at all. In this course, we'll look at the ways the cloud can enable us to build more secure software than ever, whilst also identifying where it can leave us more vulnerable. We'll also look at "hardening" the cloud – how can we take this new computing paradigm and use it to strengthen our security profiles? This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Pluralsight is not an official partner or accredited training center of EC-Council. "The Cloud" is revolutionizing how we run software and services by providing low cost, flexible, and innovative alternatives to traditional hosting models. However, with the shift to cloud comes new security considerations. The cloud isn't more secure or less secure, rather it's differently secure; it strengthens security profiles in many areas whilst presenting new risks in others. Then again, many of the traditional risks in software don't change at all. In this course, we'll look at the ways the cloud can enable us to build more secure software than ever, whilst also identifying where it can leave us more vulnerable. We'll also look at "hardening" the cloud – how can we take this new computing paradigm and use it to strengthen our security profiles? This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking