Defending Serverless Infrastructure in the Cloud
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Cloud Serverless Infrastructure
Puma Security: Serverless Prey
Establishing The Function Reverse Shell
Serverless Execution Environment
Default Function Execution Networking
Serverless Secrets Management Options
Serverless Secrets: Where is the Source Code?
GCP Function: Source Code Example
GCP Function: Configuration File Example
Azure Function: Environment Variable Example
Serverless Execution Role
Serverless Account Credential Storage
Azure Managed Service Identity Token
Function Credential Pivoting
Serverless Function Credential Lifetime
Function Malware Persistence Example
Serverless Function Persistence Lifetime
Function Credential Audit Logging
Function Network Integration Options
Function Network Integration Benefits
Function Network Integration Example
Function Network Access Control Rules
Function Network Flow Logs
Function Private Endpoints
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube