Breaking and Pwning Apps and Servers on AWS and Azure Logo

Breaking and Pwning Apps and Servers on AWS and Azure

0
Free
Visit Website

Amazon Web Services (AWS) and Azure run the most popular and used cloud infrastructure and boutique of services. There is a need for security testers, Cloud/IT admins and people tasked with the role of DevSecOps to learn on how to effectively attack and test their cloud infrastructure. In this tools and techniques based training we cover attack approaches, creating your attack arsenal in the cloud. This training is designed to help you learn how to test and attack cloud infrastructure, including AWS and Azure, using various tools and techniques. The training includes: * Hands-on labs and exercises to help you practice your skills * Real-world scenarios and case studies to help you understand how to apply your skills in real-world situations * A comprehensive guide to cloud security testing and penetration testing This training is perfect for anyone who wants to learn how to test and attack cloud infrastructure, including security testers, Cloud/IT admins, and people tasked with the role of DevSecOps.

FEATURES

ALTERNATIVES

Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.

Managed Kubernetes Inspection Tool leveraging FOSS tools to query and validate security-related settings.

Python library for building Docker images with advanced features.

A Python script to test the security of AWS S3 buckets

Nuvola is a tool for security analysis on AWS environments with a focus on creating a digital twin of cloud platforms.

A security tool that monitors AWS objects for ownership attribution, detects domain hijacking, and verifies security services.

A cloud-native security platform that combines vulnerability management, workload protection, and security monitoring for cloud environments with context-aware threat detection capabilities.

Commercial

An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.