How do you address the security of your cloud infrastructure? How to
ensure your security is sufficient? Learn how a hacker thinks and how
you should protect your cloud environment.
Many organizations approach cloud development in a similar manner as
they would to traditional IT infrastructure. With cloud-based
authentication being available to the public internet, a whole new
attack surface emerges. This is especially notable when cloud is used to
store sensitive data that is normally protected within the boundaries
of a traditional IT environment. By learning you to think as a hacker,
you can avoid many pitfalls in configuring your systems in the cloud
securely.
Students will also be taught different techniques to escalate their
privileges in a cloud environment and finally to compromise different
services within the cloud environment.