Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more.
Learn More- Career Communities
- Identity Resources
- Career Planning
- Access Career Tools
- Build Skills at Denison Edge
- Build Your Resume and Cover Letter
- Search for an Internship or Job
- Network with Confidence
- Leverage Winter Break
- Participate in the Denison Internship Program
- Prepare for an Interview
- Plan for Graduate School
- Research Industries and Companies
- Utilize Financial Resources
- Alumni
- Academic Partnerships
- Meet The Team
- Student Employment