Premium Only Content

Ethical Hacking in Cloud Computing
Learn how cloud computing relates to the different phases of ethical hacking, as well as common breaches and security threats that can affect overall cloud security.
Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks.
In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, instructor Daniel Lachance explores how many types of resources including virtual machines, databases, and storage can be deployed in a cloud computing environment.
Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common breaches and security threats that can affect overall cloud security.
He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, test-taking strategies, and much more.
-
15:10
SB Mowing
1 month agoShe had TEARS OF JOY on her face - An update on Beth
4.06K31 -
LIVE
Lofi Girl
3 years agolofi hip hop radio 📚 - beats to relax/study to
138 watching -
LIVE
Nikko Ortiz
1 hour agoLIVE - Trying Rumble Studio!
229 watching -
9:30
Sugar Spun Run
4 hours agoBlack and White Cookies
31K1 -
2:45
SLS - Street League Skateboarding
4 days agoManny Santiago's 'THIS IS 40' Part
2.14K1 -
6:40
Homesteading Family
5 days agoNever Make Pie Crust From Scratch Again (Do THIS Instead)
1.3K1 -
44:20
Melissa K Norris
3 days ago $0.20 earnedThe Most Overlooked Way to Preserve Food for Months (No Freezer Needed) w/ Sam Knapp
10K1 -
23:00
Tony Jeffries
6 days agoThe Best & Worst Boxing Training Methods (Ranked by Olympic Boxer)
7.06K -
44:44
Scammer Payback
17 days agoCrazy Confrontation with Hacked Scammer Group
29.5K19 -
1:15:13
Steven Crowder
3 hours agoIt Isn't Both Sides: They Crossed The Rubicon When They Killed Charlie
348K244