Ethical Hacking: Cloud Computing

Ethical Hacking: Cloud Computing

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 47m | 218 MB

Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more.

Topics include:

  • Common threats in cloud computing
  • Managing cloud identities
  • Enabling MFA for Azure user accounts
  • Deploying firewall solutions in an Azure environment
  • Configuring cloud storage replication
  • Enabling alert notifications
  • Using AI and ML to identify anomalies
  • Pen testing in the context of cloud computing
Table of Contents

1 Get prepped for ethical hacking cloud computing certification
2 What you should know
3 Cloud computing characteristics and security
4 Cloud deployment and service models
5 Cloud services and the hacking process
6 Common cloud computing threats
7 Cloud identity management
8 Create cloud users and groups
9 Enable MFA for cloud users
10 Cloud resource permissions RBAC and policies
11 Cloud service high availability
12 Cloud security recommendation tools
13 Deploying cloud firewall solutions
14 Cloud data residency
15 Cloud storage replication
16 Cloud virtual machine replication
17 Configure cloud load balancing
18 Cloud auditing
19 Enable cloud alert notification
20 Encryption and the cloud
21 Force HTTPS for cloud-hosted web applications
22 Deploying a cloud jump box
23 Cloud artificial intelligence and machine learning
24 Cloud DDoS protection
25 Pen testing and the cloud
26 Next steps