CEH v11: Cloud Computing Containers Hacking & Security Controls
Many of today systems are becoming cloud-based at a rapid pace. In this course you;ll explore different cloud services deployment models responsibility areas and architectures relevant to your CEH exam. Another rapidly adopted technology in today networks is containers making knowledge of them a necessary skill. You;ll examine containers technologies like Docker and orchestration as well as common security challenges. Next you;ll learn why cloud services have been prone to security issues and breaches and examine common security vulnerabilities and assessment tools. Finally you;ll learn about common security controls for cloud environments that can help you protect cloud accounts storage containers and orchestration. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.