YoVDO

Deconstructing Control Plane Compromise Attacks in Cloud Environments

Offered By: Linux Foundation via YouTube

Tags

Cloud Security Courses Cybersecurity Courses Cloud Architecture Courses Cloud Infrastructure Courses API Security Courses Threat Detection Courses Lateral Movement Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of control plane compromise attacks in cloud environments during this 58-minute Linux Foundation webinar sponsored by Fugue, a part of Snyk. Delve into the world of cloud misconfigurations, including architectural design flaws, and their role in major cloud breaches. Learn how attackers exploit the API surface to gain initial access, move laterally, and extract data undetected. Join Josh Stella, Chief Architect at Snyk, as he deconstructs these attacks, demonstrating how hackers operate against the cloud control plane. Gain valuable insights into identifying control plane compromise risks in your environment and understanding the principles of inherently secure cloud design. Through real-world examples like the Twitch breach and Imperva incident, grasp the five fundamentals of cloud security. Equip yourself with the knowledge to think like a cloud hacker and fortify your cloud infrastructure against potential threats.

Syllabus

Introduction
How hackers act
Precloud vs Cloud
Misleading headlines
Control Plane Compromise
Know Your Environment
Cloud Breaches
Twitch Breach
Whiteboard
Imperva
Five Fundamentals
Questions


Taught by

Linux Foundation

Tags

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera