وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: Cloud Computing

سرفصل های دوره

Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, instructor Daniel Lachance explores how many types of resources including virtual machines, databases, and storage can be deployed in a cloud computing environment. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common breaches and security threats that can affect overall cloud security. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, test-taking strategies, and much more.


01 - Introduction
  • 01 - Get prepped for ethical hacking cloud computing certification
  • 02 - What you should know

  • 02 - 1. Cloud Overview
  • 01 - Cloud computing characteristics and security
  • 02 - Cloud deployment and service models
  • 03 - Cloud services and the hacking process
  • 04 - Common cloud computing threats

  • 03 - 2. Cloud Identity Management
  • 01 - Cloud identity management
  • 02 - Create cloud users and groups
  • 03 - Enable MFA for cloud users
  • 04 - Azure resource permissions
  • 05 - AWS resource permissions

  • 04 - 3. Cloud High Availability
  • 01 - Cloud service high availability
  • 02 - Cloud security recommendation tools
  • 03 - Deploying cloud firewall solutions
  • 04 - Cloud data residency
  • 05 - Cloud storage replication
  • 06 - Cloud virtual machine replication
  • 07 - Configure cloud load balancing
  • 08 - Application containers and clusters

  • 05 - 4. Hardening the Cloud
  • 01 - Cloud auditing
  • 02 - Enable cloud alert notification
  • 03 - Encryption and the cloud
  • 04 - Force HTTPS for cloud-hosted web applications
  • 05 - Deploying a cloud jump box
  • 06 - Cloud artificial intelligence and machine learning
  • 07 - Cloud DDoS protection
  • 08 - Pen testing and the cloud
  • 09 - Cloud hacking tools
  • 10 - Cloud security best practices

  • 06 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 15527
    حجم: 346 مگابایت
    مدت زمان: 151 دقیقه
    تاریخ انتشار: 12 تیر 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید