Get first-hand experience with cloud penetration techniques, see what they look like and learn how to defend against them. You will use the provided template to spin up an example AWS environment in your account, hack it using scripts and watch the attack unfold in real time. Use evidence from the attack to create automated countermeasures. Leverage built-in AWS services to detect signs of compromise.
1: Experience examples of real-world advanced public cloud hacking.
2: Learn ways to detect public cloud hacking by combining weak signals.
3: Get templates to create a hack lab in your own cloud and see for yourself.
Principal Consultant, FireEye
CTO, Cloud, FireEye, Inc.
Senior Cloud Solutions Engineer, FireEye, Inc
Hackers & Threats
big data analytics cloud security hackers & threats security analytics behavioral analytics
Share With Your Community