YoVDO

When a Zero Day and Access Keys Collide in the Cloud - Responding to the SugarCRM 0-Day Vulnerability

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cloud Computing Courses Incident Response Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of attacks against AWS environments in this 24-minute Black Hat conference talk. Map out various cloud security threats using the MITRE ATT&CK Matrix framework and discover multiple prevention mechanisms organizations can implement for protection. Delve into the complexity of these attacks, understanding how seemingly harmless AWS API calls can lead to more severe, difficult-to-trace activities. Learn why a one-size-fits-all approach doesn't work in cloud security and identify key areas to focus on for effective defense against potential threats. Gain valuable insights from Margaret Zimmermann's expertise to enhance your organization's cloud security readiness.

Syllabus

When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM 0-Day Vulnerability


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network