Posted on
in Presentations
How do attackers maintain stealth, escalate privileges, and gain persistence in AWS, GCP, or Azure? Learn new red team techniques such as unlogged enumeration, hiding credentials and serverless function, and cloud shell backdoors. Apply techniques against live AWS, GCP, and Azure environments and then learn mitigation, detection, and remediation strategies to secure the environment.
Share With Your Community