CEH v11: Cloud Computing, Containers, Hacking & Security Controls
Ethical Hacker v11
| Intermediate
- 4 videos | 1h 26m 43s
- Includes Assessment
- Earns a Badge
Many of today's systems are becoming cloud-based at a rapid pace. In this course, you'll explore different cloud services, deployment models, responsibility areas, and architectures relevant to your CEH exam. Another rapidly adopted technology in today's networks is containers, making knowledge of them a necessary skill. You'll examine containers, technologies like Docker, and orchestration, as well as common security challenges. Next, you'll learn why cloud services have been prone to security issues and breaches and examine common security vulnerabilities and assessment tools. Finally, you'll learn about common security controls for cloud environments that can help you protect cloud accounts, storage, containers, and orchestration. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
Describe the different cloud computer types responsibility areasidentify the cloud service deployment modelsdescribe the different cloud computer typesrecognize the different cloud storage architecturesDescribe containers and orchestrationdescribe the five-tier container architectureidentify common security challenges for container technologies
-
Recognize common security vulnerability and assessment toolsidentify tools to enumerate amazon s3recognize tools used for gaining access to sensitive informationdescribe attack methods for accessing or enumerating cloud servicesRecognize common security controls for cloud environments that can help you protect cloud accountsidentify security controls for protecting cloud environmentsrecognize common security controls and online tools that can help with protecting cloud accounts, containers, and orchestration
IN THIS COURSE
-
23m 21sIn this video, you will learn how to identify the cloud service deployment models. FREE ACCESS
-
20m 49sUpon completion of this video, you will be able to describe the five-tier container architecture. FREE ACCESS
-
21m 56sIn this video, find out how to identify tools to enumerate Amazon S3 buckets. FREE ACCESS
-
20m 38sAfter completing this video, you will be able to recognize common security controls for cloud environments that can help you protect your cloud accounts. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.