Section 3: Cloud, Apps, and IoT Attacks
This section covers how merging technology that delivers computing services, such as online business applications, online data storage, and webmail over the internet, is presenting a new vector that should be considered and reviewed.
This part of the book comprises the following chapters:
- Chapter 13, Hacking Web Servers and Web Apps
- Chapter 14, Hacking IoT and OT
- Chapter 15, Cloud Computing
- Chapter 16, Using Cryptography
- Chapter 17, CEH Exam Practice Questions