道德黑客云计算 2023
Ethical Hacking Cloud Computing 2023
- 01 - Introduction
- 01 - Get prepped for ethical hacking cloud computing certification
- 02 - What you should know
- 02 - 1. Cloud Overview
- 01 - Cloud computing characteristics and security
- 02 - Cloud deployment and service models
- 03 - Cloud services and the hacking process
- 04 - Common cloud computing threats
- 03 - 2. Cloud Identity Management
- 01 - Cloud identity management
- 02 - Create cloud users and groups
- 03 - Enable MFA for cloud users
- 04 - Azure resource permissions
- 05 - AWS resource permissions
- 04 - 3. Cloud High Availability
- 01 - Cloud service high availability
- 02 - Cloud security recommendation tools
- 03 - Deploying cloud firewall solutions
- 04 - Cloud data residency
- 05 - Cloud storage replication
- 06 - Cloud virtual machine replication
- 07 - Configure cloud load balancing
- 08 - Application containers and clusters
- 05 - 4. Hardening the Cloud
- 01 - Cloud auditing
- 02 - Enable cloud alert notification
- 03 - Encryption and the cloud
- 04 - Force HTTPS for cloud-hosted web applications
- 05 - Deploying a cloud jump box
- 06 - Cloud artificial intelligence and machine learning
- 07 - Cloud DDoS protection
- 08 - Pen testing and the cloud
- 09 - Cloud hacking tools
- 10 - Cloud security best practices
- 06 - Conclusion
- 01 - Next steps