Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Learn how to evaluate and harden cloud-deployed resources as you study for version 10 of the Certified Ethical Hacker (CEH) exam.
Tags
Syllabus
Introduction
- Get prepped for ethical hacking cloud computing certification
- What you should know
- Cloud computing characteristics and security
- Cloud deployment and service models
- Cloud services and the hacking process
- Common cloud computing threats
- Cloud identity management
- Create cloud users and groups
- Enable MFA for cloud users
- Cloud resource permissions: RBAC and policies
- Cloud service high availability
- Cloud security recommendation tools
- Deploying cloud firewall solutions
- Cloud data residency
- Cloud storage replication
- Cloud virtual machine replication
- Configure cloud load balancing
- Cloud auditing
- Enable cloud alert notification
- Encryption and the cloud
- Force HTTPS for cloud-hosted web applications
- Deploying a cloud jump box
- Cloud artificial intelligence and machine learning
- Cloud DDoS protection
- Pen testing and the cloud
- Cloud security tools
- Next steps
Related Courses
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/285982ba98b1.jpeg)
Ethical Hacking: Cloud Computing
Affiliate notice
-
TypeOnline Course
-
Provider
Learn how to evaluate and harden cloud-deployed resources as you study for version 10 of the Certified Ethical Hacker (CEH) exam.
Introduction
- Get prepped for ethical hacking cloud computing certification
- What you should know
- Cloud computing characteristics and security
- Cloud deployment and service models
- Cloud services and the hacking process
- Common cloud computing threats
- Cloud identity management
- Create cloud users and groups
- Enable MFA for cloud users
- Cloud resource permissions: RBAC and policies
- Cloud service high availability
- Cloud security recommendation tools
- Deploying cloud firewall solutions
- Cloud data residency
- Cloud storage replication
- Cloud virtual machine replication
- Configure cloud load balancing
- Cloud auditing
- Enable cloud alert notification
- Encryption and the cloud
- Force HTTPS for cloud-hosted web applications
- Deploying a cloud jump box
- Cloud artificial intelligence and machine learning
- Cloud DDoS protection
- Pen testing and the cloud
- Cloud security tools
- Next steps
Tags
Loading...
Saving...
Loading...