Certified Ethical Hacker (Part 8 of 8): Cloud and Cryptography
Interactive

Certified Ethical Hacker (Part 8 of 8): Cloud and Cryptography

Biz Library
Updated Jan 21, 2020

Enterprises have increasingly become enamored with the ease of use and scalability afforded by cloud computing. Unfortunately, external and internal clouds now represent the ultimate prize for hackers. Rafiq Wayani will address the unique challenges cloud computing represents for cybersecurity professionals and discuss best practices regarding cryptography and encryption.

Lesson 1:

  • Intro to Cloud Computing
  • Cloud Computing Diagram
  • Intro to Cloud Computing
  • Pizza as a Service
  • Intro to Cloud Computing.

Lesson 2:

  • Cloud Computing Threats
  • Cloud Computing Threats Cont.

Lesson 3:

  • Cloud Computing Attacks
  • Cloud Computing Attacks Cont.

Lesson 4:

  • Cloud Security
  • Cloud Security Cont.

Lesson 5:

  • Demo: Cloud Security
  • Demo: Cloud Security Tools.

Lesson 6:

  • Cloud Penetration Testing
  • Cloud Pen Testing Cont.

Lesson 7:

  • 2014: The Year of Encryption
  • The Year of Encryption Cont.

Lesson 8:

  • Demo: The Heartbleed Bug
  • Demo: The Heartbleed Bug Cont. Lesson 9:
  • Demo: POODLEbleed
  • Demo: POODLEbleed Cont.

Lesson 10:

  • Cryptography Concepts
  • Cryptography Concepts Cont.

Lesson 11:

  • Encryption Algorithms
  • Encryption Algorithms Cont.

Lesson 12:

  • Public Key Infrastructure
  • PKI Cont.

Lesson 13:

  • Demo: Email Encryption
  • Demo: Email Encryption Cont.

Lesson 14:

  • Disk Encryption
  • Disk Encryption Cont.

Lesson 15:

  • Cryptography Attacks
  • Cryptography Attacks Cont.

Lesson 16:

  • Demo: CrypTool
  • Demo: Cipher Tools
  • Demo: Matasano Challenges.