Explore the vulnerabilities and attacks that can lead to cloud systems being compromised.
Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
- describe cloud computing threats like insecure interfaces, malicious insiders, and more
- describe cloud computer attacks like service and session hijacking, DNS attacks, SQL injection, and more
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.