Deconstructing Control Plane Compromise Attacks in Cloud Environments
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the intricacies of control plane compromise attacks in cloud environments during this 58-minute Linux Foundation webinar sponsored by Fugue, a part of Snyk. Delve into the world of cloud misconfigurations, including architectural design flaws, and their role in major cloud breaches. Learn how attackers exploit the API surface to gain initial access, move laterally, and extract data undetected. Join Josh Stella, Chief Architect at Snyk, as he deconstructs these attacks, demonstrating how hackers operate against the cloud control plane. Gain valuable insights into identifying control plane compromise risks in your environment and understanding the principles of inherently secure cloud design. Through real-world examples like the Twitch breach and Imperva incident, grasp the five fundamentals of cloud security. Equip yourself with the knowledge to think like a cloud hacker and fortify your cloud infrastructure against potential threats.
Syllabus
Introduction
How hackers act
Precloud vs Cloud
Misleading headlines
Control Plane Compromise
Know Your Environment
Cloud Breaches
Twitch Breach
Whiteboard
Imperva
Five Fundamentals
Questions
Taught by
Linux Foundation
Tags
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera