About the course
Join the webinar: Monday 4th July, UK: 16:00 - 17:00 BST
USA: 08.00 - 09.00 PST
USA: 11:00 - 12:00 EST
Presenter: Martin Cernac, Black Hat Trainer, and accredited pentester.
The last couple of years have seen a tremendous growth in cloud adoption. Every organisation has some cloud usage, relying either on a mixture of in-house and public cloud or they are fully cloud based. This unprecedented adoption of technologies has opened gaping holes in an organisation’s security landscape.
Whilst moving to the cloud is a sensible move because vendors are taking an increasingly larger responsibility in being more proactive towards security, it also opens organisations up to be more severely punished for their mistakes.
In this webinar, we will discuss various scenarios where cloud-based technologies have given opportunities to attackers that have resulted in catastrophic repercussions for the company involved.
We will look at ways to exploit these cloud environments from an attacker’s point of view, covering various phases of attack from enumeration to exploitation, through the escalation of privileges and ending with a complete takeover of the cloud network.
Register to join, we look forward to talking to you.