Download pdf
Get first-hand experience with cloud penetration techniques, see what they look like and learn how to defend against them. You will use the provided template to spin up an example AWS environment in your account, hack it using scripts and watch the attack unfold in real time. Use evidence from the attack to create automated countermeasures. Leverage built-in AWS services to detect signs of compromise.

Learning Objectives:
1: Experience examples of real-world advanced public cloud hacking.
2: Learn ways to detect public cloud hacking by combining weak signals.
3: Get templates to create a hack lab in your own cloud and see for yourself.
Presenters