1:00 PM ET | 10:00 AM PT
Ever wondered how hackers attack cloud services and pivot inside an environment? This webcast will demo “barq” – the AWS post-exploitation tool – and touch on methods of gaining and keeping access inside a cloud environment, illustrating methods to backdoor compromised accounts, cloud-wide credential theft, and other attacks. This webcast will help penetration testers understand the cloud and how its components interact in order to better penetrate and assess risks in cloud environments.
GIAC and (ISC)2 members are eligible for CPE credits for attending this webcast live. Learn more.
This webcast is sponsored by Accurics. Accurics helps organizations accelerate innovation by aligning development, operational, and security teams behind easily enforceable security and resiliency goals.
Register now for this upcoming webcast: