• Online, Self-Paced
Course Description

Explore the vulnerabilities and attacks that can lead to cloud systems being compromised.

Learning Objectives

Certified Ethical Hacker - CEHv10: Cloud Computer Attacks

  • describe cloud computing threats like insecure interfaces, malicious insiders, and more
  • describe cloud computer attacks like service and session hijacking, DNS attacks, SQL injection, and more

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.