CEH v12: Cloud Computing, Containers, Hacking, and Security Controls

CEH v12    |    Intermediate
  • 4 videos | 1h 29m 3s
  • Includes Assessment
  • Earns a Badge
Many of today's systems are becoming cloud-based at a rapid pace. In this course, you'll explore different cloud services, deployment models, responsibility areas, and architectures relevant to your CEH exam. Another rapidly adopted technology in today's networks is containers, making knowledge of them a necessary skill. You'll examine containers, technologies like Docker, and orchestration, as well as common security challenges. Next, you'll learn why cloud services have been prone to security issues and breaches and examine common security vulnerabilities and assessment tools. Finally, you'll learn about common security controls for cloud environments that can help you protect cloud accounts, storage, containers, and orchestration. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe the different cloud computer types responsibility areas
    identify the cloud service deployment models
    describe the different cloud computer types
    recognize the different cloud storage architectures
    Describe containers and orchestration
    describe the five-tier container architecture
    identify common security challenges for container technologies
  • Recognize common security vulnerability and assessment tools
    identify tools to enumerate amazon s3
    recognize tools used for gaining access to sensitive information
    describe attack methods for accessing or enumerating cloud services
    Recognize common security controls for cloud environments that can help you protect cloud accounts
    identify security controls for protecting cloud environments
    recognize common security controls and online tools that can help with protecting cloud accounts, containers, and orchestration

IN THIS COURSE

  • Locked
    1.  Cloud Computing Concepts
    22m 24s
    After completing this video, you will be able to identify the different cloud services, deployment models, responsibility areas, and architectures relevant to ethical hacking. FREE ACCESS
  • Locked
    2.  Container Concepts
    17m 24s
    Upon completion of this video, you will be able to describe containers, orchestration, and common security challenges for container technologies. FREE ACCESS
  • Locked
    3.  Hacking Cloud Services
    30m 14s
    After completing this video, you will be able to recognize common security vulnerabilities and assessment tools for gaining access to sensitive information or cloud accounts. FREE ACCESS
  • Locked
    4.  Cloud Security Controls
    19m 2s
    Upon completion of this video, you will be able to recognize common security controls for cloud environments that can help you protect cloud accounts, storage, containers, and orchestration. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 96 users Rating 4.7 of 96 users (96)
Rating 1.0 of 1 users Rating 1.0 of 1 users (1)