Updated
12/18/2020Released
2/12/2020- Common threats in cloud computing
- Managing cloud identities
- Enabling MFA for Azure user accounts
- Deploying firewall solutions in an Azure environment
- Configuring cloud storage replication
- Enabling alert notifications
- Using AI and ML to identify anomalies
- Pen testing in the context of cloud computing
Skill Level Intermediate
Duration
Views
- [Dan] The primary focus of this course is to make you think like an attacker attempting to compromise a cloud computing environment so that you can protect cloud computing environments. This is going to be done by us talking about cloud characteristics models and threats to cloud services. This is important as a starting point so that we can then apply the hacking process to cloud computing. That feeds into securing cloud identities, so working with cloud-based user accounts and groups and enabling multifactor authentication for user accounts. We're then going to be covering how to increase cloud system and data availability through back-ups and by replicating to alternate regions in case of a regional outage. We're also going to talk about how we can reduce the cloud attack surface. Some of these techniques will be similar to what you might do in an on-premises environment. Hi, I'm Dan Lachance. Over the years I've done IT work in the form of authoring tech books, programming, network administration, teaching classes and security management in on-premises and cloud environments.
Share this video
Embed this video
Video: Get prepped for ethical hacking cloud computing certification