YoVDO

What Do Hackers See When They Look at the Clouds

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Incident Response Courses Cloud Security Courses

Course Description

Overview

Explore the world of cloud security through the eyes of hackers in this 44CON Information Security Conference talk. Delve into the history of cloud computing, understand the concept of "cloud as someone else's computer," and examine real-world security incidents. Learn valuable lessons on implementing security by design, discover techniques for finding abandoned subdomains, and understand methods to bypass firewalls. Gain insights into the critical role of metadata services in cloud environments and how they can be exploited. Equip yourself with essential knowledge to better protect cloud infrastructures and stay one step ahead of potential threats.

Syllabus

Introduction
History Lesson
Cloud is someone elses computer
Incidents
Lessons Learned
Security by Design
Finding abandoned subdomains
Bypass Firewalls
Metadata Service


Taught by

44CON Information Security Conference

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera