Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Deconstructing Control Plane Compromise Attacks in Cloud Environments

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of control plane compromise attacks in cloud environments during this 58-minute Linux Foundation webinar sponsored by Fugue, a part of Snyk. Delve into the world of cloud misconfigurations, including architectural design flaws, and their role in major cloud breaches. Learn how attackers exploit the API surface to gain initial access, move laterally, and extract data undetected. Join Josh Stella, Chief Architect at Snyk, as he deconstructs these attacks, demonstrating how hackers operate against the cloud control plane. Gain valuable insights into identifying control plane compromise risks in your environment and understanding the principles of inherently secure cloud design. Through real-world examples like the Twitch breach and Imperva incident, grasp the five fundamentals of cloud security. Equip yourself with the knowledge to think like a cloud hacker and fortify your cloud infrastructure against potential threats.

Syllabus

Introduction
How hackers act
Precloud vs Cloud
Misleading headlines
Control Plane Compromise
Know Your Environment
Cloud Breaches
Twitch Breach
Whiteboard
Imperva
Five Fundamentals
Questions

Taught by

Linux Foundation

Reviews

Start your review of Deconstructing Control Plane Compromise Attacks in Cloud Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.