CEH v11: Cloud Computing, Containers, Hacking & Security Controls

Ethical Hacker v11    |    Intermediate
  • 4 videos | 1h 26m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 18 users Rating 4.6 of 18 users (18)
Many of today's systems are becoming cloud-based at a rapid pace. In this course, you'll explore different cloud services, deployment models, responsibility areas, and architectures relevant to your CEH exam. Another rapidly adopted technology in today's networks is containers, making knowledge of them a necessary skill. You'll examine containers, technologies like Docker, and orchestration, as well as common security challenges. Next, you'll learn why cloud services have been prone to security issues and breaches and examine common security vulnerabilities and assessment tools. Finally, you'll learn about common security controls for cloud environments that can help you protect cloud accounts, storage, containers, and orchestration. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe the different cloud computer types responsibility areas
    identify the cloud service deployment models
    describe the different cloud computer types
    recognize the different cloud storage architectures
    Describe containers and orchestration
    describe the five-tier container architecture
    identify common security challenges for container technologies
  • Recognize common security vulnerability and assessment tools
    identify tools to enumerate amazon s3
    recognize tools used for gaining access to sensitive information
    describe attack methods for accessing or enumerating cloud services
    Recognize common security controls for cloud environments that can help you protect cloud accounts
    identify security controls for protecting cloud environments
    recognize common security controls and online tools that can help with protecting cloud accounts, containers, and orchestration

IN THIS COURSE

  • Locked
    1.  Cloud Computing Concepts
    23m 21s
    In this video, you will learn how to identify the cloud service deployment models. FREE ACCESS
  • Locked
    2.  Container Concepts
    20m 49s
    Upon completion of this video, you will be able to describe the five-tier container architecture. FREE ACCESS
  • Locked
    3.  Hacking Cloud Services
    21m 56s
    In this video, find out how to identify tools to enumerate Amazon S3 buckets. FREE ACCESS
  • Locked
    4.  Cloud Security Controls
    20m 38s
    After completing this video, you will be able to recognize common security controls for cloud environments that can help you protect your cloud accounts. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
Rating 4.5 of 22 users Rating 4.5 of 22 users (22)
Rating 4.6 of 35 users Rating 4.6 of 35 users (35)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
Rating 4.6 of 20 users Rating 4.6 of 20 users (20)