Ethical Hacking [CEHPrep] Mod Cloud Security

1 – Cloud Computing Concepts_Cloud Deployment Models.
1 – Cloud Computing Concepts_From On-premise to Cloud.
1 – Cloud Computing Concepts_Is the Cloud Secure.
1 – Cloud Computing Concepts_Overview.
1 – Cloud Computing Concepts_Summary.
1 – Cloud Computing Concepts_The Characteristics of a Cloud Service.
1 – Cloud Computing Concepts_The NIST Cloud Computing Reference Architecture.
1 – Cloud Computing Concepts_The Promise of the Cloud.
1 – Cloud Computing Concepts_Understanding IaaS, PaaS, and SaaS.
2 – Organizational Security Considerations_Client-driven Penetration Tests.
2 – Organizational Security Considerations_Commercial Considerations.
2 – Organizational Security Considerations_Compliance Assessments.
2 – Organizational Security Considerations_Data Sovereignty.
2 – Organizational Security Considerations_Everything Old Is New Again.
2 – Organizational Security Considerations_Overview.
2 – Organizational Security Considerations_Shadow IT.
2 – Organizational Security Considerations_Summary.
3 – Cloud Computing Risks_Compromise of Administration Facilities.
3 – Cloud Computing Risks_Economic Denial of Sustainability (EDoS).
3 – Cloud Computing Risks_Hypervisor Breakouts.
3 – Cloud Computing Risks_Malicious Cloud Uses.
3 – Cloud Computing Risks_Other Potential Risks.
3 – Cloud Computing Risks_Overview.
3 – Cloud Computing Risks_Service Hijacking via Social Engineering.
3 – Cloud Computing Risks_Summary.
4 – Cloud Computing Security Strengths_Account Management as a Service.
4 – Cloud Computing Security Strengths_Auditability.
4 – Cloud Computing Security Strengths_DDoS Prevention.
4 – Cloud Computing Security Strengths_Key Vaults.
4 – Cloud Computing Security Strengths_Overview.
4 – Cloud Computing Security Strengths_Server Administration as a Service.
4 – Cloud Computing Security Strengths_Summary.
4 – Cloud Computing Security Strengths_VNet on Demand.
5 – Hardening the Cloud_Data Replication and Redundancy.
5 – Hardening the Cloud_Hardening the Configuration.
5 – Hardening the Cloud_Overview.
5 – Hardening the Cloud_Securing the Administration Portal.
5 – Hardening the Cloud_Securing the Transport Layer.
5 – Hardening the Cloud_Security as a Service.
5 – Hardening the Cloud_SQL Injection Alerts in Azure.
5 – Hardening the Cloud_Summary.

Comments