Ethical Hacker: Cloud Computer Attacks

Ethical Hacker 10    |    Intermediate
  • 2 videos | 1h 4m 1s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 18 users Rating 4.3 of 18 users (18)
Explore the vulnerabilities and attacks that can lead to cloud systems being compromised, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to describe cloud computing threats that involve using the cloud services within the attack, follow best practices with time and logging within the cloud, recognize common cloud computing attacks, describe the cloud attack that translates SOAP messages, define the cloud attack that involves placing the attacker's synchronization token on the user's system, and list the OWASP Top 10 Application Security Risks.

WHAT YOU WILL LEARN

  • List the common cloud computing attacks
    identity best practices with time and logging within the cloud
    describe cloud computing threats that involve using the cloud services within the attack
  • Identify the owasp top 10 application security risks
    define the cloud attack that involves placing the attackers synchronization token on the user’s system
    describe the cloud attack that translates soap messages

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 199 users Rating 4.6 of 199 users (199)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 16 users Rating 4.8 of 16 users (16)
Rating 4.8 of 20 users Rating 4.8 of 20 users (20)
Rating 4.4 of 20 users Rating 4.4 of 20 users (20)