Cloud security

Cloud security
Introduction Security is an important aspect of our IT world, because there are many breaches in various companies taking place on a daily basis. There are m

July 23, 2015
Dejan Lukan
Cloud security
Introduction In our daily lives, there are many services with which we have to use authentication in order to get access; be it personal services like our cl

June 25, 2015
Dejan Lukan
Cloud security
Introduction Cloud services have mushroomed in the past couple of years and are becoming widely-used by a large number of people and companies. There are man

June 04, 2015
Dejan Lukan
Cloud security
When mega-retailer Target was the victim of a data breach during the 2013 holiday season, more than 70 million customers earned that their personal informat

April 02, 2015
Noah Gamer
Cloud security
In Depth The software industry is relentlessly moving toward centralized computing. Due to this trend, software and data are being taken away from convention

December 05, 2014
AJ Kumar
Cloud security
SSH service running on port 22 is one of the most widely used services on the Internet. There are numerous reasons for its widespread use, among which is dir

November 19, 2014
Dejan Lukan
Cloud security
Introduction The cloud has been around for some time now and is still gaining popularity in every day operations of IT companies. I've seen different compani

September 17, 2014
Dejan Lukan
Cloud security
1.0. Executive Summary Organizations seeking to protect sensitive and mission-critical data quickly realize that there is no single answer to keep all system

September 12, 2014
Infosec
Cloud security
From our experience in the cloud, layers of security are best Cloud computing infrastructure is elastic, scalable, highly available, and accessible - but is

September 05, 2014
Patrick Kerpan
Cloud security
Cloud computing is changing the way we interact with devices, software, data and processes. But some things never change, and one thing that remains true acr

August 13, 2014
Debra Littlejohn ShinderIn this series
- Top 11 cloud computing certifications for 2025
- The rise of cloud computing: Trends and predictions
- Understanding the basics of cloud infrastructure: What you need to know
- How cloud security, data privacy, and cybersecurity convergence drives successful careers
- Secure cloud computing: What you need to know
- Working across multiple cloud service providers: CSP security learning path
- Securing cloud-based applications training: What you need to know
- Security risks of cloud migration
- DevSecOps in the Azure Cloud
- Amazon Athena Security: 6 essential tips
- Securing cloud endpoints: What you should know
- AWS security and compliance overview
- CloudGoat walkthrough series: IAM privilege escalation by attachment
- CloudGoat walkthrough series: EC2 server-side request forgery (SSRF)
- CloudGoat walkthrough series: Remote code execution
- CloudGoat walkthrough series: Lambda Privilege Escalation
- Information security strategy for the hybrid and multi-cloud
- CloudGoat walkthrough series: Cloud Breach S3
- CloudGoat walkthrough series: IAM privilege escalation by rollback
- Working with CloudGoat: The “vulnerable by design” AWS environment
- Malicious Amazon Machine Images (AMIs)
- Key findings from Ponemon’s State of Vulnerability Management in the Cloud and On-Premises report
- Cloud Pentesting Certification Boot Camp: The ultimate guide
- Cloud Based IDS and IPS Solutions [Updated 2019]
- AWS Security Monitoring Checklist [Updated 2019]
- Amazon Inspector: A cloud-based vulnerability assessment tool
- System administrator vs. cloud administrator
- 5 key cloud security use cases
- Deep Packet Inspection in the Cloud
- Honeypots in the Cloud
- Biometrics in the Cloud
- Open-Source Intelligence Collection in Cloud Platforms
- How to Safeguard Against the Privacy Implications of Cloud Computing
- AWS Cloud Security for Beginners — Part 2
- AWS Cloud Security for Beginners — Part 1
- AWS Security Monitoring Checklist — Part 2
- Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It
- Controlling the Risks of Cloud-Enabled End-Point Security Products
- The Ultimate Guide to CCSP Certification
- Five Reasons Why Security Professionals Need the Cloud
- Amazon S3 Buckets-Hardening
- Cloud Service Reconnaissance
- Cloud Computing Security: Be Secure Before Moving to Cloud
- Cloud Technology Bringing New Possibilities in Threat Management
- Attacking the Cloud
- Man in the Cloud Attacks: Prevention and Containment
- Cloud originated DDoS attacks
- Where Is Your Data Safer? In the Cloud Or On Premise?
- DDOS Protection for Public Cloud Customers
- Security Barriers in the Adaptation of Cloud Technology
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!