Amazon Web Services (AWS) and Azure run the most popular and used cloud infrastructure and boutique of services. There is a need for security testers, Cloud/IT admins and people tasked with the role of DevSecOps to learn on how to effectively attack and test their cloud infrastructure. In this tools and techniques based training we cover attack approaches, creating your attack arsenal in the cloud. This training is designed to help you learn how to test and attack cloud infrastructure, including AWS and Azure, using various tools and techniques. The training includes: * Hands-on labs and exercises to help you practice your skills * Real-world scenarios and case studies to help you understand how to apply your skills in real-world situations * A comprehensive guide to cloud security testing and penetration testing This training is perfect for anyone who wants to learn how to test and attack cloud infrastructure, including security testers, Cloud/IT admins, and people tasked with the role of DevSecOps.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
A collection of security workshops and hands-on content for AWS security services and techniques
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.
A framework to analyze container images and gather useful information.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.
Kube-bench is a tool for checking Kubernetes security based on CIS Kubernetes Benchmark.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.