->

Lynda - Ethical Hacking: Cloud Computing

Ethical Hacking: Cloud Computing

English | 1h 47m | Video 720p | Subtitles

Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more.


 

Topics include:

 

Common threats in cloud computing 

Managing cloud identities

Enabling MFA for Azure user accounts

Deploying firewall solutions in an Azure environment

Configuring cloud storage replication 

Enabling alert notifications

Using AI and ML to identify anomalies 

Pen testing in the context of cloud computing

 

Homepage:

https://www.lynda.com/IT-tutorials/Ethical-Hacking-Cloud-Computing/2820195-2.html

 

Lynda - Ethical Hacking: Cloud Computing


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Solid   |  

Information
Members of Guests cannot leave comments.




rss