What Do Hackers See When They Look at the Clouds
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the world of cloud security through the eyes of hackers in this 44CON Information Security Conference talk. Delve into the history of cloud computing, understand the concept of "cloud as someone else's computer," and examine real-world security incidents. Learn valuable lessons on implementing security by design, discover techniques for finding abandoned subdomains, and understand methods to bypass firewalls. Gain insights into the critical role of metadata services in cloud environments and how they can be exploited. Equip yourself with essential knowledge to better protect cloud infrastructures and stay one step ahead of potential threats.
Syllabus
Introduction
History Lesson
Cloud is someone elses computer
Incidents
Lessons Learned
Security by Design
Finding abandoned subdomains
Bypass Firewalls
Metadata Service
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube Why Security-as-a-Feature Will Never Happen
44CON Information Security Conference via YouTube