All Your Cloud Are Belong To Us - Hunting Compromise in Azure
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore cloud security vulnerabilities and compromise detection techniques in Azure through this 55-minute conference talk from TROOPERS18. Delve into traditional networking concepts, network security groups, and cloud networking, with a focus on AWS and Azure. Learn about the origins of cloud security concerns, methods for identifying potential threats, and the impact of significant cyber incidents like WannaCry. Gain insights into patching strategies, cloud marketplaces, and essential security measures to protect your cloud infrastructure from potential attacks.
Syllabus
Introduction
Traditional Networking
How did this start
How do I find this
Network Security Group
Cloud Network
AWS
Showdown
XMail Server
MQTT
Own Tracks
Shadow Brokers
Double Pulser
Wannacry
Security
Patching
Cloud marketplaces
Closing thoughts
Taught by
WEareTROOPERS
Related Courses
AWS IoT: Developing and Deploying an Internet of ThingsAmazon Web Services via edX A Subjective Introduction to the IoT
ITMO University via edX IoT Networking and Fog Layer Devices
ITMO University via edX Introducción al Internet de las cosas (IoT) y sus aplicaciones
Universidad del Rosario via edX Intel® Edge AI for IoT Developers
Intel via Udacity