Course Description
Explore the vulnerabilities and attacks that can lead to cloud systems being compromised.
Learning Objectives
Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
- describe cloud computing threats like insecure interfaces, malicious insiders, and more
- describe cloud computer attacks like service and session hijacking, DNS attacks, SQL injection, and more