Linkedin Learning – Ethical Hacking Cloud Computing

Linkedin Learning – Ethical Hacking Cloud Computing-QUiD
English | Size: 226.70 MB
Category: Tutorial


Cloud resource hardening and monitoring goes a long way in mitigating cloud-based attacks. In this course which maps to the Cloud Computing module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden cloud-deployed resources. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common threats that affect cloud computing environments He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, and more

PluralSight – Citrix Virtual Apps and Desktops CVAD Migrate to Citrix Cloud

PluralSight – Citrix Virtual Apps and Desktops CVAD Migrate to Citrix Cloud Bookware-KNiSO
English | Size: 174.71 MB
Category: Tutorial


Translate everything you’ve learned about on-premises Citrix Virtual Apps and Desktops (CVAD) to the Citrix Virtual Apps and Desktops Service (CVADS) in Citrix Cloud in this course

LinuxCBT – Cloud Platforms (Pack 2020)

LinuxCBT – Cloud Platforms (Pack 2020)
English | Size: 9.12 GB
Category: Tutorial


Included:
-> AWS-EC2
– EC2 Edition (AWS EC2 Administration)
– EC2-ASG Edition (AWS ASG – Auto-Scaling of Instances)
– EC2-CLI Edition (AWS EC2 CLI Administration)
– EC2-VPC Edition (AWS Virtual Private Clouds VPCs)

Cybrary it Certificate of Cloud Security Knowledge CCSK-SNYLK

Cybrary it Certificate of Cloud Security Knowledge CCSK-SNYLK
English | Size: 3.02 GB
Category: Tutorial


This course prepares you to take the Certificate of Cloud Security Knowledge (CCSK) certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.