Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

What Do Hackers See When They Look at the Clouds

44CON Information Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of cloud security through the eyes of hackers in this 44CON Information Security Conference talk. Delve into the history of cloud computing, understand the concept of "cloud as someone else's computer," and examine real-world security incidents. Learn valuable lessons on implementing security by design, discover techniques for finding abandoned subdomains, and understand methods to bypass firewalls. Gain insights into the critical role of metadata services in cloud environments and how they can be exploited. Equip yourself with essential knowledge to better protect cloud infrastructures and stay one step ahead of potential threats.

Syllabus

Introduction
History Lesson
Cloud is someone elses computer
Incidents
Lessons Learned
Security by Design
Finding abandoned subdomains
Bypass Firewalls
Metadata Service

Taught by

44CON Information Security Conference

Reviews

Start your review of What Do Hackers See When They Look at the Clouds

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.