Effective Cloud Penetration Testing requires looking into the most common cloud misconfigurations. In this course, Cloud Environment Pen Testing, you'll learn to identify these misconfigurations. First, you'll explore Container and Kubernetes pen testing. Next, you'll discover Serverless functions permission misconfigurations. Finally, you'll learn how misconfigured access to in-memory stores can be exploited. When you're finished with this course, you'll have the skills and knowledge needed for pen testing in a cloud environment.
Overview
Effective Cloud Penetration Testing requires looking into the most common cloud misconfigurations. In this course, Cloud Environment Pen Testing, you'll learn to identify these misconfigurations. First, you'll explore Container and Kubernetes pen testing. Next, you'll discover Serverless functions permission misconfigurations. Finally, you'll learn how misconfigured access to in-memory stores can be exploited. When you're finished with this course, you'll have the skills and knowledge needed for pen testing in a cloud environment.
Taught by
Chris Jackson