Breaking and Pwning Apps and Servers on AWS and Azure Logo

Breaking and Pwning Apps and Servers on AWS and Azure

0
Free
Visit Website

Amazon Web Services (AWS) and Azure run the most popular and used cloud infrastructure and boutique of services. There is a need for security testers, Cloud/IT admins and people tasked with the role of DevSecOps to learn on how to effectively attack and test their cloud infrastructure. In this tools and techniques based training we cover attack approaches, creating your attack arsenal in the cloud. This training is designed to help you learn how to test and attack cloud infrastructure, including AWS and Azure, using various tools and techniques. The training includes: * Hands-on labs and exercises to help you practice your skills * Real-world scenarios and case studies to help you understand how to apply your skills in real-world situations * A comprehensive guide to cloud security testing and penetration testing This training is perfect for anyone who wants to learn how to test and attack cloud infrastructure, including security testers, Cloud/IT admins, and people tasked with the role of DevSecOps.

FEATURES

ALTERNATIVES

A workload policy enforcement tool for Kubernetes with various supported policies and configuration options.

Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.

ScubaGear assesses Microsoft 365 tenant configurations against CISA Secure Configuration Baselines, using PowerShell and Open Policy Agent to compare settings and generate compliance reports.

A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.

A security toolkit for Amazon S3

A cloud-native application protection platform that provides comprehensive security monitoring, vulnerability management, and threat detection for cloud environments and container workloads.

Commercial

Open-source tool for analyzing AWS temporary tokens to detect malicious activity.

A collection of tools for forensics teams to collect evidence from cloud platforms

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security