YoVDO

Infrastructure as Remote Code Execution: How to Abuse Terraform

Offered By: HackMiami via YouTube

Tags

Terraform Courses DevOps Courses Cloud Security Courses Infrastructure as Code Courses Privilege Escalation Courses Data Exfiltration Courses Remote Code Execution Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the potential security risks associated with Terraform, a popular infrastructure-as-code tool, in this 36-minute conference talk from HackMiami XI. Discover how malicious actors can exploit Terraform to elevate privileges, exfiltrate sensitive data, and gain unauthorized access to cloud environments. Watch live demonstrations of real-world attack scenarios and learn practical recommendations for securing Terraform implementations. Presented by Michael McCabe, president of Cloud Security Partners and experienced speaker at security conferences, this talk offers valuable insights for professionals involved in cloud security and infrastructure management.

Syllabus

Hackmiami XI - Mike McCabe - Infrastructure as Remote Code Execution: How to abuse Terraform


Taught by

HackMiami

Related Courses

Terraform Basics: Automate Provisioning of AWS EC2 Instances
Coursera Project Network via Coursera
DevOps CI/CD Pipeline: Automation from development to deployment
Universidad Anáhuac via edX
DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX
DevOps Foundations: Software Development Optimization
Universidad Anáhuac via edX
Fundamentos de DevOps: Optimiza el desarrollo del software
Universidad Anáhuac via edX