YoVDO

Infrastructure as Remote Code Execution: How to Abuse Terraform

Offered By: HackMiami via YouTube

Tags

Terraform Courses DevOps Courses Cloud Security Courses Infrastructure as Code Courses Privilege Escalation Courses Data Exfiltration Courses Remote Code Execution Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the potential security risks associated with Terraform, a popular infrastructure-as-code tool, in this 36-minute conference talk from HackMiami XI. Discover how malicious actors can exploit Terraform to elevate privileges, exfiltrate sensitive data, and gain unauthorized access to cloud environments. Watch live demonstrations of real-world attack scenarios and learn practical recommendations for securing Terraform implementations. Presented by Michael McCabe, president of Cloud Security Partners and experienced speaker at security conferences, this talk offers valuable insights for professionals involved in cloud security and infrastructure management.

Syllabus

Hackmiami XI - Mike McCabe - Infrastructure as Remote Code Execution: How to abuse Terraform


Taught by

HackMiami

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy