Companies Home Search Profile

Ethical Hacking: Cloud Computing

Focused View

Daniel Lachance

2:30:56

60 View
  • 01 - Get prepped for ethical hacking cloud computing certification.mp4
    01:10
  • 02 - What you should know.mp4
    01:46
  • 01 - Cloud computing characteristics and security.mp4
    06:00
  • 02 - Cloud deployment and service models.mp4
    06:14
  • 03 - Cloud services and the hacking process.mp4
    05:16
  • 04 - Common cloud computing threats.mp4
    08:29
  • 01 - Cloud identity management.mp4
    08:37
  • 02 - Create cloud users and groups.mp4
    06:01
  • 03 - Enable MFA for cloud users.mp4
    03:41
  • 04 - Azure resource permissions.mp4
    05:48
  • 05 - AWS resource permissions.mp4
    05:33
  • 01 - Cloud service high availability.mp4
    04:51
  • 02 - Cloud security recommendation tools.mp4
    03:35
  • 03 - Deploying cloud firewall solutions.mp4
    04:42
  • 04 - Cloud data residency.mp4
    03:23
  • 05 - Cloud storage replication.mp4
    02:02
  • 06 - Cloud virtual machine replication.mp4
    02:27
  • 07 - Configure cloud load balancing.mp4
    06:35
  • 08 - Application containers and clusters.mp4
    07:42
  • 01 - Cloud auditing.mp4
    05:57
  • 02 - Enable cloud alert notification.mp4
    05:41
  • 03 - Encryption and the cloud.mp4
    02:58
  • 04 - Force HTTPS for cloud-hosted web applications.mp4
    07:20
  • 05 - Deploying a cloud jump box.mp4
    05:02
  • 06 - Cloud artificial intelligence and machine learning.mp4
    02:59
  • 07 - Cloud DDoS protection.mp4
    02:11
  • 08 - Pen testing and the cloud.mp4
    06:26
  • 09 - Cloud hacking tools.mp4
    08:15
  • 10 - Cloud security best practices.mp4
    08:50
  • 01 - Next steps.mp4
    01:25
  • Description


    Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, instructor Daniel Lachance explores how many types of resources including virtual machines, databases, and storage can be deployed in a cloud computing environment. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common breaches and security threats that can affect overall cloud security. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, test-taking strategies, and much more.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Daniel Lachance
    Daniel Lachance
    Instructor's Courses
    Highly motivated and passionate IT evangelist
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 30
    • duration 2:30:56
    • English subtitles has
    • Release Date 2023/07/02