SEC588 Cloud Penetration Testing: What is Cloud Pen Testing and why is it different?
Presented by: Moses Frost
Learn ethical hacking: https://www.sans.org/course/cloud-penetration-testing
Everyone has been speaking about Cloud and Public Cloud Technologies for many years now. Many organizations have been steadily moving their workloads into either public utility clouds, platforms, or at times internal private clouds. One commonly asked question; is the cloud substantially different than other technologies or is it just a big computer in the sky? Yes! To both! There is an adage that goes something like "Unix! It's all the same but different". The cloud is pretty much the same in many aspects. In this webcast, we are going to show you how in Cloud EVERYTHING is both the SAME and DIFFERENT. We will be talking about why penetration testing in the cloud features some of our well known and well-loved principals like privilege escalation, but also how it's vastly different in both technologies and features.
More importantly, where Cloud Penetration Testing fits into the SANS Penetration Testing curriculum and how it's a class that is unique to the industry. Join me, Moses Frost, the course author, as we go after clouds.
Видео SEC588 Cloud Penetration Testing: What is Cloud Pen Testing and why is it different? канала SANS Offensive Operations
Learn ethical hacking: https://www.sans.org/course/cloud-penetration-testing
Everyone has been speaking about Cloud and Public Cloud Technologies for many years now. Many organizations have been steadily moving their workloads into either public utility clouds, platforms, or at times internal private clouds. One commonly asked question; is the cloud substantially different than other technologies or is it just a big computer in the sky? Yes! To both! There is an adage that goes something like "Unix! It's all the same but different". The cloud is pretty much the same in many aspects. In this webcast, we are going to show you how in Cloud EVERYTHING is both the SAME and DIFFERENT. We will be talking about why penetration testing in the cloud features some of our well known and well-loved principals like privilege escalation, but also how it's vastly different in both technologies and features.
More importantly, where Cloud Penetration Testing fits into the SANS Penetration Testing curriculum and how it's a class that is unique to the industry. Join me, Moses Frost, the course author, as we go after clouds.
Видео SEC588 Cloud Penetration Testing: What is Cloud Pen Testing and why is it different? канала SANS Offensive Operations
Показать
Комментарии отсутствуют
Информация о видео
16 декабря 2019 г. 23:21:19
00:59:42
Другие видео канала
![SANS Webcast: So, You Wanna Be a Pen Tester 3 Paths to Consider](https://i.ytimg.com/vi/qFNi1hdKpnE/default.jpg)
![Cloud Penetration Testing](https://i.ytimg.com/vi/aqumgrSBDM4/default.jpg)
![Intro to Cloud Infrastructure Penetration Testing](https://i.ytimg.com/vi/ffBcIkjumBc/default.jpg)
![The Top 10 Tools For Cloud Penetration Testing - Michael Born](https://i.ytimg.com/vi/K8BfA8lzca8/default.jpg)
![Attacking AWS: The Full Cyber Kill Chain - Pawel Rzepa](https://i.ytimg.com/vi/Bg1Pd-9YTRQ/default.jpg)
![SANS DFIR Webcast - APT Attacks Exposed: Network, Host, Memory, and Malware Analysis](https://i.ytimg.com/vi/r9Ctji9djxI/default.jpg)
![Faster, Better, AND Cheaper: Improving security operations using open source tools](https://i.ytimg.com/vi/jhOpV9eEeb0/default.jpg)
![](https://i.ytimg.com/vi/p2ZjEF3qLMI/default.jpg)
![Looking to switch into a Cyber Security Career? Watch this!](https://i.ytimg.com/vi/QXTszbT_viA/default.jpg)
![Hacking the Cloud: Exploiting AWS Misconfigurations](https://i.ytimg.com/vi/0PhKK-GHgBI/default.jpg)
![Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017](https://i.ytimg.com/vi/fnYp2DN_XZc/default.jpg)
![Cloud Security Myths and Facts | Intro to Cloud Security Certifications | Cloud Maturity Model](https://i.ytimg.com/vi/36kXhtSInN8/default.jpg)
![DIY Pen-Testing for Your Kubernetes Cluster - Liz Rice, Aqua Security](https://i.ytimg.com/vi/fVqCAUJiIn0/default.jpg)
![DEF CON 25 - Gerald Steere, Sean Metcalf - Hacking the Cloud](https://i.ytimg.com/vi/LufXEPTlPak/default.jpg)
![Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 2019](https://i.ytimg.com/vi/3IAOSWHCGQo/default.jpg)
![Lessons Learned from Illumina's SecDevOps Transition - SANS Secure DevOps Summit 2018](https://i.ytimg.com/vi/El0HZt44wbc/default.jpg)
![Offensive Ansible For Red Teams (Attack, Build, Learn) - Leo McCavana](https://i.ytimg.com/vi/1xupoIHjEs8/default.jpg)
![How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017](https://i.ytimg.com/vi/qg-zK2zv4ng/default.jpg)
![TryHackMe! Buffer Overflow & Penetration Testing](https://i.ytimg.com/vi/2ZZPwwXOH08/default.jpg)
!["An introduction to Penetration Testing using Kali Linux" - Marcus Herstik (LCA 2020)](https://i.ytimg.com/vi/ng1bvXsp9ZA/default.jpg)