YoVDO

What Do Hackers See When They Look at the Clouds

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Incident Response Courses Cloud Security Courses

Course Description

Overview

Explore the world of cloud security through the eyes of hackers in this 44CON Information Security Conference talk. Delve into the history of cloud computing, understand the concept of "cloud as someone else's computer," and examine real-world security incidents. Learn valuable lessons on implementing security by design, discover techniques for finding abandoned subdomains, and understand methods to bypass firewalls. Gain insights into the critical role of metadata services in cloud environments and how they can be exploited. Equip yourself with essential knowledge to better protect cloud infrastructures and stay one step ahead of potential threats.

Syllabus

Introduction
History Lesson
Cloud is someone elses computer
Incidents
Lessons Learned
Security by Design
Finding abandoned subdomains
Bypass Firewalls
Metadata Service


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
Why Security-as-a-Feature Will Never Happen
44CON Information Security Conference via YouTube