SlideShare a Scribd company logo
Domain 8 of CEH: Cloud Computing
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
Domains of CEH
1.Information Security and Ethical Hacking Overview-6%
2.Reconnaissance Techniques-21%
3.System hacking phases and Attack Techniques-17%
4.Network and perimeter hacking-14%
5.Web application hacking-16%
6.Wireless network hacking-6%
7.Mobile platform, IoT, and OT hacking-8%
8.Cloud Computing-6%
9.Cryptography-6%
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
We will discuss the eighth domain of CEH, which is β€˜Cloud Computing.’
What is Cloud Computing?
Cloud computing delivers services like databases, software, servers, intelligence, and
storage over the internet to provide faster innovation, economics of scale, and flexible
resources.
To know the importance of cloud computing, let me tell you about life without cloud
computing. Assume you are willing to host a website. You will need to buy a lot of
servers, manage the traffic, maintain and monitor the servers. Now to do so, we need
both extra money and extra human resources.
οƒ˜ If you consider the cost, buying servers is very expensive.
οƒ˜ Troubleshooting server problems can be tedious and can reduce the efficiency of
your business.
οƒ˜ As traffic will change from time to time, your servers will mostly be in the ideal state.
οƒ˜ And storing a lot of data is always a big problem.
οƒ˜ So, to help us overcome these problems, cloud computing has come into existence.
οƒ˜ In simple terms, cloud computing is a tremendous amount of space available online
to store the data, process it, and access it whenever we want.
www.infosectrain.com | sales@infosectrain.com
How does cloud computing work?
Rather than buying complete infrastructure and data centers, organizations
can actually rent storage, applications, and other functionalities from cloud
providers.
Companies using cloud computing services can avoid much of the upfront
cost and complexity of owning and maintaining their own IT infrastructure
and instead only pay for the services they have used.
The providers of cloud computing services can benefit from substantial
economies of scale by delivering the same services to a broader range of
clients.
www.infosectrain.com | sales@infosectrain.com
A few examples of cloud computing
Below are some of the examples of cloud computing we usually use every day.
Zoom: Zoom is a cloud-based audio and video mobile application used on both
iOS and Android devices. You can either start or join a meeting by using zoom.
Microsoft Office 365 and Google Docs: Google Docs and Microsoft Office 365
can be used by online users. We can use Google Docs and Microsoft Office 365
for presentations and maintain and store data.
Aws Lambda: Lambda allows developers to execute code without the need to
provide or manage servers for apps or backend services. The pay-as-you-go
approach scales consistently with an organization in order to accommodate
changes in data use and storage in real-time.
www.infosectrain.com | sales@infosectrain.com
The advantages of cloud computing
Cost: Cloud computing is a lot cheaper. Because in the cloud computing
environment, we need not buy servers and computers, and there is no need to
hire technical staff to maintain these servers.
Speed: The majority of cloud computing services are self-service and on-
demand, which means that even massive quantities of computing resources can
be provisioned within minutes, typically with just a few clicks, which allows
companies a great deal of flexibility.
Security: The majority of cloud providers offer several policies, controls, and
technologies that improve your overall security posture, supporting the
protection of your data, apps, and infrastructure. So, data saved in the cloud is
more secure than files, videos, and images stored on our own devices.
Reliability: Due to the fact that data can be mirrored at multiple redundant sites
within the provider’s network, cloud computing makes data backup, disaster
recovery, and business continuity more convenient and less expensive.
www.infosectrain.com | sales@infosectrain.com
Performance: A large number of cloud computing services run on secure data centers
located globally that are regularly upgraded to the most current generation of fast
and efficient computing hardware. As a result, applications run more smoothly, and
there are greater savings than using a single data center.
Characteristics of cloud computing
Elasticity: If there is massive traffic, we can scale up our services, and when there is
less traffic, we can scale down the services we need, which is also one of the most
significant advantages of cloud computing.
Pay-per-use: By having a physical server of our own, we have to pay ideally without
considering our usage. But with cloud computing, we can only pay for the servers and
resources we have used. This characteristic of cloud computing can save a lot of
money.
Self-service provisioning: Almost any workload type can be accelerated on-demand
by an end-user. IT administrators are no longer needed to manage and provision
computing resources, as end users can provision resources like server time and
network storage.
www.infosectrain.com | sales@infosectrain.com
CEH with InfosecTrain
InfosecTrain is one of the leading training providers with a pocket-friendly budget.
We invite you to join us for an unforgettable journey with industry experts to gain
a better understanding of the Certified Ethical Hacker course. Courses can be
taken as live instructor-led sessions or as self-paced courses, allowing you to
complete your training journey at your convenience.
About InfosecTrain
β€’ Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
β€’ Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
β€’ High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | sales@infosectrain.com
Our Endorsements
www.infosectrain.com | sales@infosectrain.com
Why InfosecTrain Global Learning Partners
Flexible modes
of Training
Tailor Made
Training
Post training
completion
Certified and
Experienced Instructors
Access to the
recorded
sessions
www.infosectrain.com | sales@infosectrain.com
Our Trusted Clients
www.infosectrain.com | sales@infosectrain.com
Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 /
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com

More Related Content

Similar to Domain 8 of CEH Cloud Computing.pptx

Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Harish Chander
Β 
High Cloud Computing Backbone Technology.pptx
High Cloud Computing Backbone Technology.pptxHigh Cloud Computing Backbone Technology.pptx
High Cloud Computing Backbone Technology.pptx
Agusto Sipahutar
Β 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
TSplusIndia
Β 
Cloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdfCloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdf
gokulprasanna4
Β 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data CenterJason Basye
Β 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
Faisal Shehzad
Β 
Sukeru Technologies Private Beta
Sukeru Technologies Private BetaSukeru Technologies Private Beta
Sukeru Technologies Private BetaPanggi Jasri Akadol
Β 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | Sysfore
Sysfore Technologies
Β 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing services
abidhassan225
Β 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
Asif Ali
Β 
Cloud computing
Cloud computingCloud computing
Cloud computing
Gopika Babu
Β 
Cloud computing
Cloud computingCloud computing
Cloud computing
Vaishnavi Mishra
Β 
Brief on Cloud Computing Definition.pdf
Brief on Cloud Computing Definition.pdfBrief on Cloud Computing Definition.pdf
Brief on Cloud Computing Definition.pdf
Sample Assignment
Β 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
Kumayl Rajani
Β 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
SumitSaini169007
Β 
Cloud computing course in Rohini
Cloud computing course in RohiniCloud computing course in Rohini
Cloud computing course in Rohini
PoornimaDhingra
Β 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control AuditingNavin Malhotra
Β 
How to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the CloudHow to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the Cloud
Synotive - Software Development Company
Β 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
khan593595
Β 

Similar to Domain 8 of CEH Cloud Computing.pptx (20)

Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Β 
High Cloud Computing Backbone Technology.pptx
High Cloud Computing Backbone Technology.pptxHigh Cloud Computing Backbone Technology.pptx
High Cloud Computing Backbone Technology.pptx
Β 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
Β 
Cloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdfCloud Computing Trends in MSMEs (2).pdf
Cloud Computing Trends in MSMEs (2).pdf
Β 
Sukeru Technologies
Sukeru TechnologiesSukeru Technologies
Sukeru Technologies
Β 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
Β 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
Β 
Sukeru Technologies Private Beta
Sukeru Technologies Private BetaSukeru Technologies Private Beta
Sukeru Technologies Private Beta
Β 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | Sysfore
Β 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing services
Β 
Cloud services.pdf
Cloud services.pdfCloud services.pdf
Cloud services.pdf
Β 
Cloud computing
Cloud computingCloud computing
Cloud computing
Β 
Cloud computing
Cloud computingCloud computing
Cloud computing
Β 
Brief on Cloud Computing Definition.pdf
Brief on Cloud Computing Definition.pdfBrief on Cloud Computing Definition.pdf
Brief on Cloud Computing Definition.pdf
Β 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
Β 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
Β 
Cloud computing course in Rohini
Cloud computing course in RohiniCloud computing course in Rohini
Cloud computing course in Rohini
Β 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control Auditing
Β 
How to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the CloudHow to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the Cloud
Β 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
Β 

More from Infosectrain3

Turning off Autofill.pdf
Turning off Autofill.pdfTurning off Autofill.pdf
Turning off Autofill.pdf
Infosectrain3
Β 
Targeted Ransomware.pdf
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
Infosectrain3
Β 
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdfExploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Infosectrain3
Β 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
Infosectrain3
Β 
Security tips for Travelers.pdf
Security tips for Travelers.pdfSecurity tips for Travelers.pdf
Security tips for Travelers.pdf
Infosectrain3
Β 
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdfThreat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Infosectrain3
Β 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
Infosectrain3
Β 
The Cyber Villains.pdf
The Cyber Villains.pdfThe Cyber Villains.pdf
The Cyber Villains.pdf
Infosectrain3
Β 
Types of Servers in Computing.pdf
Types of Servers in Computing.pdfTypes of Servers in Computing.pdf
Types of Servers in Computing.pdf
Infosectrain3
Β 
Types of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdfTypes of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdf
Infosectrain3
Β 
Google's AI Red Team.pdf
Google's AI Red Team.pdfGoogle's AI Red Team.pdf
Google's AI Red Team.pdf
Infosectrain3
Β 
A to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdfA to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdf
Infosectrain3
Β 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
Infosectrain3
Β 
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptxInterview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Infosectrain3
Β 
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptxInterview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Infosectrain3
Β 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
Infosectrain3
Β 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
Infosectrain3
Β 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
Infosectrain3
Β 
How DNS Works.pptx
How DNS Works.pptxHow DNS Works.pptx
How DNS Works.pptx
Infosectrain3
Β 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
Infosectrain3
Β 

More from Infosectrain3 (20)

Turning off Autofill.pdf
Turning off Autofill.pdfTurning off Autofill.pdf
Turning off Autofill.pdf
Β 
Targeted Ransomware.pdf
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
Β 
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdfExploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Β 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
Β 
Security tips for Travelers.pdf
Security tips for Travelers.pdfSecurity tips for Travelers.pdf
Security tips for Travelers.pdf
Β 
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdfThreat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Β 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
Β 
The Cyber Villains.pdf
The Cyber Villains.pdfThe Cyber Villains.pdf
The Cyber Villains.pdf
Β 
Types of Servers in Computing.pdf
Types of Servers in Computing.pdfTypes of Servers in Computing.pdf
Types of Servers in Computing.pdf
Β 
Types of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdfTypes of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdf
Β 
Google's AI Red Team.pdf
Google's AI Red Team.pdfGoogle's AI Red Team.pdf
Google's AI Red Team.pdf
Β 
A to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdfA to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdf
Β 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
Β 
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptxInterview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Β 
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptxInterview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Β 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
Β 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
Β 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
Β 
How DNS Works.pptx
How DNS Works.pptxHow DNS Works.pptx
How DNS Works.pptx
Β 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
Β 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
Β 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
Β 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
Β 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
Β 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
Β 
The Accursed House by Γ‰mile Gaboriau.pptx
The Accursed House by Γ‰mile Gaboriau.pptxThe Accursed House by Γ‰mile Gaboriau.pptx
The Accursed House by Γ‰mile Gaboriau.pptx
DhatriParmar
Β 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
Β 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
Β 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
Β 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
Β 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
Β 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
Β 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
Β 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
Β 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
Β 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
Β 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
Β 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
Β 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
Β 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
Β 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Β 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Β 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Β 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Β 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Β 
The Accursed House by Γ‰mile Gaboriau.pptx
The Accursed House by Γ‰mile Gaboriau.pptxThe Accursed House by Γ‰mile Gaboriau.pptx
The Accursed House by Γ‰mile Gaboriau.pptx
Β 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Β 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
Β 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Β 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Β 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
Β 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
Β 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Β 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Β 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
Β 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Β 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
Β 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
Β 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Β 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Β 

Domain 8 of CEH Cloud Computing.pptx

  • 1. Domain 8 of CEH: Cloud Computing www.infosectrain.com | sales@infosectrain.com
  • 3. www.infosectrain.com | sales@infosectrain.com Domains of CEH 1.Information Security and Ethical Hacking Overview-6% 2.Reconnaissance Techniques-21% 3.System hacking phases and Attack Techniques-17% 4.Network and perimeter hacking-14% 5.Web application hacking-16% 6.Wireless network hacking-6% 7.Mobile platform, IoT, and OT hacking-8% 8.Cloud Computing-6% 9.Cryptography-6%
  • 5. www.infosectrain.com | sales@infosectrain.com We will discuss the eighth domain of CEH, which is β€˜Cloud Computing.’ What is Cloud Computing? Cloud computing delivers services like databases, software, servers, intelligence, and storage over the internet to provide faster innovation, economics of scale, and flexible resources. To know the importance of cloud computing, let me tell you about life without cloud computing. Assume you are willing to host a website. You will need to buy a lot of servers, manage the traffic, maintain and monitor the servers. Now to do so, we need both extra money and extra human resources. οƒ˜ If you consider the cost, buying servers is very expensive. οƒ˜ Troubleshooting server problems can be tedious and can reduce the efficiency of your business. οƒ˜ As traffic will change from time to time, your servers will mostly be in the ideal state. οƒ˜ And storing a lot of data is always a big problem. οƒ˜ So, to help us overcome these problems, cloud computing has come into existence. οƒ˜ In simple terms, cloud computing is a tremendous amount of space available online to store the data, process it, and access it whenever we want.
  • 6. www.infosectrain.com | sales@infosectrain.com How does cloud computing work? Rather than buying complete infrastructure and data centers, organizations can actually rent storage, applications, and other functionalities from cloud providers. Companies using cloud computing services can avoid much of the upfront cost and complexity of owning and maintaining their own IT infrastructure and instead only pay for the services they have used. The providers of cloud computing services can benefit from substantial economies of scale by delivering the same services to a broader range of clients.
  • 7. www.infosectrain.com | sales@infosectrain.com A few examples of cloud computing Below are some of the examples of cloud computing we usually use every day. Zoom: Zoom is a cloud-based audio and video mobile application used on both iOS and Android devices. You can either start or join a meeting by using zoom. Microsoft Office 365 and Google Docs: Google Docs and Microsoft Office 365 can be used by online users. We can use Google Docs and Microsoft Office 365 for presentations and maintain and store data. Aws Lambda: Lambda allows developers to execute code without the need to provide or manage servers for apps or backend services. The pay-as-you-go approach scales consistently with an organization in order to accommodate changes in data use and storage in real-time.
  • 8. www.infosectrain.com | sales@infosectrain.com The advantages of cloud computing Cost: Cloud computing is a lot cheaper. Because in the cloud computing environment, we need not buy servers and computers, and there is no need to hire technical staff to maintain these servers. Speed: The majority of cloud computing services are self-service and on- demand, which means that even massive quantities of computing resources can be provisioned within minutes, typically with just a few clicks, which allows companies a great deal of flexibility. Security: The majority of cloud providers offer several policies, controls, and technologies that improve your overall security posture, supporting the protection of your data, apps, and infrastructure. So, data saved in the cloud is more secure than files, videos, and images stored on our own devices. Reliability: Due to the fact that data can be mirrored at multiple redundant sites within the provider’s network, cloud computing makes data backup, disaster recovery, and business continuity more convenient and less expensive.
  • 9. www.infosectrain.com | sales@infosectrain.com Performance: A large number of cloud computing services run on secure data centers located globally that are regularly upgraded to the most current generation of fast and efficient computing hardware. As a result, applications run more smoothly, and there are greater savings than using a single data center. Characteristics of cloud computing Elasticity: If there is massive traffic, we can scale up our services, and when there is less traffic, we can scale down the services we need, which is also one of the most significant advantages of cloud computing. Pay-per-use: By having a physical server of our own, we have to pay ideally without considering our usage. But with cloud computing, we can only pay for the servers and resources we have used. This characteristic of cloud computing can save a lot of money. Self-service provisioning: Almost any workload type can be accelerated on-demand by an end-user. IT administrators are no longer needed to manage and provision computing resources, as end users can provision resources like server time and network storage.
  • 10. www.infosectrain.com | sales@infosectrain.com CEH with InfosecTrain InfosecTrain is one of the leading training providers with a pocket-friendly budget. We invite you to join us for an unforgettable journey with industry experts to gain a better understanding of the Certified Ethical Hacker course. Courses can be taken as live instructor-led sessions or as self-paced courses, allowing you to complete your training journey at your convenience.
  • 11. About InfosecTrain β€’ Established in 2016, we are one of the finest Security and Technology Training and Consulting company β€’ Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain β€’ High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com
  • 12. Our Endorsements www.infosectrain.com | sales@infosectrain.com
  • 13. Why InfosecTrain Global Learning Partners Flexible modes of Training Tailor Made Training Post training completion Certified and Experienced Instructors Access to the recorded sessions www.infosectrain.com | sales@infosectrain.com
  • 14. Our Trusted Clients www.infosectrain.com | sales@infosectrain.com
  • 15.
  • 16. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com