Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, certified IT trainer Daniel Lachance explores the many types of ethical hacking resources that can be deployed in a cloud computing environment.
Learn More