YoVDO

Knock Knock, Who's There? Identifying Assets in the Cloud - Ben Sadehipour - Ekoparty Security Conference - 2020

Offered By: Ekoparty Security Conference via YouTube

Tags

Ekoparty Security Conference Courses Cybersecurity Courses Bug Bounty Courses Cloud Security Courses

Course Description

Overview

Descubre cómo identificar activos en la nube en esta charla de 41 minutos de la conferencia de seguridad Ekoparty 2020. Explora las razones para escanear la nube, metodologías, expectativas y el uso de herramientas como Meg. Examina ejemplos de bug bounty y admin bounty, y conoce las herramientas y lanzamientos relevantes. Aprende los fundamentos para iniciarte en el emocionante mundo de la caza de vulnerabilidades a cambio de recompensas.

Syllabus

Intro
Why scan the cloud
How we did it
Expectations
Using Meg
How it works
Bug bounty examples
Admin bounty examples
Tools and releases


Taught by

Ekoparty Security Conference

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera