Webinar: Through an Attacker's Eyes - Your Infrastructure

Provided by

Enquire about this course

About the course

Join the webinar: Monday 7th February, 2022, UK: 16:00 - 17:00 GMT
USA: 08.00 - 09.00 PDT
USA: 11:00 - 12:00 EDT

Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester.  

In the session, Scott will explore recently publicized Cloud Security Breaches, accompanied by real-world examples of how available reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners. 

You will learn and hear about:
-  Examples and case studies of the past cloud hacks
-  How cloud security differs from conventional security 
-  Cloud infrastructure defense 
-  Using Cloud services to perform continuous monitoring and defense

The webinar is for those who want to know what different types of common cyberattacks are launched against data and applications in the cloud, and how best to defend against them.  Ideal for those with existing cloud environments or those planning to move to a cloud environment. 

Register to join, we look forward to talking to you.


Start date Location / delivery
07 Feb 2022 Live Online Webinar Book now

Related article

Qufaro have become cyber champions of the neurodiverse community, actively promoting opportunities and support. Through the Autism in the Workplace...