Learn your way! Get started

Certified Ethical Hacker, Part 8 of 8: Cloud and Cryptography

with expert Rafiq Wayani


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 3/23/2016
Level Intermediate
Runtime 1h 24m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Enterprises have increasingly become enamored with the ease of use and scalability afforded by cloud computing. Unfortunately, external and internal clouds now represent the ultimate prize for hackers. Rafiq Wayani will address the unique challenges cloud computing represents for cybersecurity professionals and discuss best practices regarding cryptography and encryption. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).

Prerequisites

To get the most out of this course, this course assumes that you have a good working knowledge of Linux and Windows based networking environments. It also assumes that you have experience with managing a network, have worked with networking hardware such as switches & routers, are familiar with MS Active Directory (AD) Domain based authentication, know how to work with command-line utilities, and understand the basics of Web Server environments. Many of the demonstrations in this course use the Windows 7 and Kali Linux operating systems which can be downloaded free from the respective sites. All of the demonstrations are created in a virtual environment using Oracle VirtualBox and VMware vSphere 6.

Learning Paths

This course will help you prepare for the following certification and exam:
Certified Ethical Hacker
312-50: Certified Ethical Hacker

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Cloud Computing

Intro to Cloud Computing (06:54)
  • Introduction (00:26)
  • Intro to Cloud Computing (00:55)
  • Cloud Computing Diagram (00:44)
  • Intro to Cloud Computing (00:25)
  • Pizza as a Service (02:53)
  • Intro to Cloud Computing (01:11)
  • Summary (00:16)
Cloud Computing Threats (05:28)
  • Introduction (00:14)
  • Cloud Computing Threats (02:46)
  • Cloud Computing Threats Cont. (02:04)
  • Summary (00:22)
Cloud Computing Attacks (06:35)
  • Introduction (00:16)
  • Cloud Computing Attacks (03:06)
  • Cloud Computing Attacks Cont. (02:59)
  • Summary (00:13)
Cloud Security (06:15)
  • Introduction (00:18)
  • Cloud Security (03:37)
  • Cloud Security Cont. (02:07)
  • Summary (00:12)
Cloud Security Tools (05:45)
  • Introduction (00:18)
  • Demo: Cloud Security (01:55)
  • Demo: Cloud Security Tools (03:09)
  • Summary (00:22)
Cloud Penetration Testing (06:04)
  • Introduction (00:33)
  • Cloud Penetration Testing (02:37)
  • Cloud Pen Testing Cont. (02:42)
  • Summary (00:11)

Cryptography

2014: The Year of Encryption (04:21)
  • Introduction (00:27)
  • 2014: The Year of Encryption (02:03)
  • The Year of Encryption Cont. (01:29)
  • Summary (00:20)
Case Study: Heartbleed (03:36)
  • Introduction (00:17)
  • Demo: The Heartbleed Bug (01:18)
  • Demo: The Heartbleed Bug Cont. (01:45)
  • Summary (00:14)
Case Study: POODLEbleed (03:21)
  • Introduction (00:22)
  • Demo: POODLEbleed (01:47)
  • Demo: POODLEbleed Cont. (00:58)
  • Summary (00:13)
Cryptography Concepts (05:01)
  • Introduction (00:20)
  • Cryptography Concepts (02:01)
  • Cryptography Concepts Cont. (02:29)
  • Summary (00:10)
Encryption Algorithms (06:13)
  • Introduction (00:16)
  • Encryption Algorithms (01:39)
  • Encryption Algoritms Cont. (03:59)
  • Summary (00:10)
Security Tools (04:54)
  • Introduction (00:16)
  • Security Tools (00:59)
  • True Crypt (01:38)
  • Tor (01:52)
  • Summary (00:10)
Public Key Infrastructure (03:35)
  • Introduction (00:28)
  • Public Key Infrastructure (01:06)
  • PKI Cont. (01:45)
  • Summary (00:15)
Email Encryption (03:54)
  • Introduction (00:17)
  • Demo: Email Encryption (01:39)
  • Demo: Email Encryption Cont. (01:42)
  • Summary (00:15)
Disk Encryption (04:23)
  • Introduction (00:19)
  • Disk Encryption (02:06)
  • Disk Encryption Cont. (01:44)
  • Summary (00:14)
Cryptography Attacks (04:27)
  • Introduction (00:17)
  • Cryptography Attacks (02:20)
  • Cryptography Attacks Cont. (01:41)
  • Summary (00:08)
Cryptography Tools (04:01)
  • Introduction (00:15)
  • Demo: CrypTool (01:19)
  • Demo: Cipher Tools (01:22)
  • Demo: Matasano Challenges (00:52)
  • Summary (00:12)