What Do Hackers See When They Look at the Clouds
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the world of cloud security through the eyes of hackers in this 44CON Information Security Conference talk. Delve into the history of cloud computing, understand the concept of "cloud as someone else's computer," and examine real-world security incidents. Learn valuable lessons on implementing security by design, discover techniques for finding abandoned subdomains, and understand methods to bypass firewalls. Gain insights into the critical role of metadata services in cloud environments and how they can be exploited. Equip yourself with essential knowledge to better protect cloud infrastructures and stay one step ahead of potential threats.
Syllabus
Introduction
History Lesson
Cloud is someone elses computer
Incidents
Lessons Learned
Security by Design
Finding abandoned subdomains
Bypass Firewalls
Metadata Service
Taught by
44CON Information Security Conference
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera