YoVDO

Infrastructure as Remote Code Execution: How to Abuse Terraform to Elevate Access

Offered By: LASCON via YouTube

Tags

Terraform Courses Cloud Security Courses Infrastructure as Code Courses Privilege Escalation Courses Data Exfiltration Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore potential security risks associated with Terraform, a popular infrastructure-as-code tool, in this 35-minute conference talk from LASCON. Discover how malicious actors can exploit Terraform to elevate privileges, exfiltrate sensitive data, and gain unauthorized access to cloud environments. Witness live demonstrations of real-world attack scenarios and learn practical recommendations for securing Terraform implementations to protect your infrastructure from potential threats.

Syllabus

Mike McCabe - Infrastructure as Remote Code Execution: How to abuse Terraform to elevate access


Taught by

LASCON

Related Courses

Terraform Basics: Automate Provisioning of AWS EC2 Instances
Coursera Project Network via Coursera
DevOps CI/CD Pipeline: Automation from development to deployment
Universidad Anáhuac via edX
DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX
DevOps Foundations: Software Development Optimization
Universidad Anáhuac via edX
Fundamentos de DevOps: Optimiza el desarrollo del software
Universidad Anáhuac via edX