YoVDO

All Your Cloud Are Belong To Us - Hunting Compromise in Azure

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Amazon Web Services (AWS) Courses MQTT Courses Cloud Security Courses

Course Description

Overview

Explore cloud security vulnerabilities and compromise detection techniques in Azure through this 55-minute conference talk from TROOPERS18. Delve into traditional networking concepts, network security groups, and cloud networking, with a focus on AWS and Azure. Learn about the origins of cloud security concerns, methods for identifying potential threats, and the impact of significant cyber incidents like WannaCry. Gain insights into patching strategies, cloud marketplaces, and essential security measures to protect your cloud infrastructure from potential attacks.

Syllabus

Introduction
Traditional Networking
How did this start
How do I find this
Network Security Group
Cloud Network
AWS
Showdown
XMail Server
MQTT
Own Tracks
Shadow Brokers
Double Pulser
Wannacry
Security
Patching
Cloud marketplaces
Closing thoughts


Taught by

WEareTROOPERS

Related Courses

AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
A Subjective Introduction to the IoT
ITMO University via edX
IoT Networking and Fog Layer Devices
ITMO University via edX
Introducción al Internet de las cosas (IoT) y sus aplicaciones
Universidad del Rosario via edX
Intel® Edge AI for IoT Developers
Intel via Udacity