Project Athena
Ctrlk
  • Welcome
  • Module 00 - Mindset
    • Introduction
    • Lectures
  • Module 01 - Ethics and Legal
    • Introduction
    • Lectures
  • Module 02 - Reconnaissance
    • Introduction
    • Lectures
  • Module 03 - Penetration Testing
    • Introduction
  • Module 04 - Web Security
    • Introduction
    • Lectures
  • Module 05 - Hacking with Python
    • Introduction
  • Module 06 - Assembly
    • Introduction
  • Module 07 - Reverse Engineering
    • Introduction
  • Module 08 - Binary Exploitation
    • Introduction
  • Module 09 - Forensics
    • Introduction
  • Module 10 - Metasploit
    • Introduction
  • Module 11 - Linux and Server Security
    • Introduction
    • Lectures
  • Module 12 - Windows and AD Security
    • Introduction
  • Module 13 - Blue Teaming
    • Introduction
    • Lectures
  • Module 14 - Cryptography
    • Introduction
    • Lectures
  • Module 15 - Password Cracking
    • Introduction
  • Module 16 - Hardware Hacking
    • Introduction
  • Module 17 - Cloud Security
    • Introduction
    • Lectures
      • Overview of Cloud Security
      • Comparison of Server Types: Cloud, Dedicated, and Shared Servers
      • User and Permission Management in Cloud Platforms
      • Containerization Overview:
      • Cloud Computing Security Concepts:
      • Secure DevOps in the Cloud
      • Exploring Key Certifications and Standards in On-Premises and Cloud Security
  • Module 18 - Mobile Security
    • Introduction
  • Module 19 - Wireless Security
    • Introduction
    • Lectures
  • Module 20 - RATs and Rootkits
    • Introduction
    • Lectures
  • Module 21 - AI in offensive Security
    • Introduction
  • Module 22 - Social Engineering
    • Introduction
    • Lectures
Powered by GitBook
On this page
  1. Module 17 - Cloud Security
  2. Lectures

Overview of Cloud Security

PreviousLecturesNextComparison of Server Types: Cloud, Dedicated, and Shared Servers

Last updated 1 year ago