• Online, Self-Paced
Course Description

Explore the vulnerabilities and attacks that can lead to cloud systems being compromised.

Learning Objectives

Certified Ethical Hacker - CEHv10: Cloud Computer Attacks

  • describe cloud computing threats like insecure interfaces, malicious insiders, and more
  • describe cloud computer attacks like service and session hijacking, DNS attacks, SQL injection, and more

Framework Connections