Cloud Hacking - Malware Not Needed
Offered By: NahamSec via YouTube
Course Description
Overview
Explore cloud hacking techniques without malware in this 27-minute conference talk from Nahamcon 2022. Dive into various hacking types, state actors, and cloud exploitation methods. Learn about Crowdstrike, zero trust principles, and cloud APIs. Discover strategies for gaining an initial foothold in cloud environments. Gain insights into offensive security practices and understand the evolving landscape of cloud-based threats.
Syllabus
Intro
Types of hacking
State actors
Cloud exploitation
Crowdstrike
Zero trust
Cloud APIs
Initial foothold
Taught by
NahamSec
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network