Certified Ethical Hacker - CEHv10: Cloud Computer Attacks


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Explore the vulnerabilities and attacks that can lead to cloud systems being compromised, as you prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to describe cloud computing threats that involve using the cloud services within the attack, follow best practices with time and logging within the cloud, recognize common cloud computing attacks, describe the cloud attack that translates SOAP messages, define the cloud attack that involves placing the attacker’s synchronization token on the user’s system, and list the OWASP Top 10 Application Security Risks.

Expected Duration (hours)
1.1

Lesson Objectives

Certified Ethical Hacker - CEHv10: Cloud Computer Attacks

  • describe cloud computing threats that involve using the cloud services within the attack
  • identity best practices with time and logging within the cloud
  • list the common cloud computing attacks
  • define the cloud attack that involves placing the attackers synchronization token on the user’s system
  • describe the cloud attack that translates SOAP messages
  • identify the OWASP Top 10 Application Security Risks
  • Course Number:
    it_spceh10tv_38_04_enus

    Expertise Level
    Intermediate