Computer EngineeringComputer Information SystemsComputer NetworkingComputer ScienceComputing & Information TechnologyCybersecurity

Ethical Hacking: Cloud Computing

Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, certified IT trainer Daniel Lachance explores the many types of ethical hacking resources that can be deployed in a cloud computing environment.

Learn More