CEH v11: Cloud Computing Containers Hacking & Security Controls
Many of todays systems are becoming cloud-based at a rapid pace. In this course youll explore different cloud services deployment models responsibility areas and architectures relevant to your CEH exam. Another rapidly adopted technology in todays networks is containers making knowledge of them a necessary skill. Youll examine containers technologies like Docker and orchestration as well as common security challenges. Next youll learn why cloud services have been prone to security issues and breaches and examine common security vulnerabilities and assessment tools. Finally youll learn about common security controls for cloud environments that can help you protect cloud accounts storage containers and orchestration. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.