CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
CEH v12
| Intermediate
- 4 videos | 1h 29m 3s
- Includes Assessment
- Earns a Badge
Many of today's systems are becoming cloud-based at a rapid pace. In this course, you'll explore different cloud services, deployment models, responsibility areas, and architectures relevant to your CEH exam. Another rapidly adopted technology in today's networks is containers, making knowledge of them a necessary skill. You'll examine containers, technologies like Docker, and orchestration, as well as common security challenges. Next, you'll learn why cloud services have been prone to security issues and breaches and examine common security vulnerabilities and assessment tools. Finally, you'll learn about common security controls for cloud environments that can help you protect cloud accounts, storage, containers, and orchestration. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Describe the different cloud computer types responsibility areasidentify the cloud service deployment modelsdescribe the different cloud computer typesrecognize the different cloud storage architecturesDescribe containers and orchestrationdescribe the five-tier container architectureidentify common security challenges for container technologies
-
Recognize common security vulnerability and assessment toolsidentify tools to enumerate amazon s3recognize tools used for gaining access to sensitive informationdescribe attack methods for accessing or enumerating cloud servicesRecognize common security controls for cloud environments that can help you protect cloud accountsidentify security controls for protecting cloud environmentsrecognize common security controls and online tools that can help with protecting cloud accounts, containers, and orchestration
IN THIS COURSE
-
22m 24sAfter completing this video, you will be able to identify the different cloud services, deployment models, responsibility areas, and architectures relevant to ethical hacking. FREE ACCESS
-
17m 24sUpon completion of this video, you will be able to describe containers, orchestration, and common security challenges for container technologies. FREE ACCESS
-
30m 14sAfter completing this video, you will be able to recognize common security vulnerabilities and assessment tools for gaining access to sensitive information or cloud accounts. FREE ACCESS
-
19m 2sUpon completion of this video, you will be able to recognize common security controls for cloud environments that can help you protect cloud accounts, storage, containers, and orchestration. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.