课程: Ethical Hacking: Cloud Computing
今天就学习课程吧!
今天就开通帐号,24,700 门业界名师课程任您挑!
Pen testing and the cloud
- [Narrator] Penetration tests identify and attempt to exploit discovered network and host vulnerabilities. In this video, you'll learn about pen testing in the context of cloud computing. The first thing I've done here, is gone to the "penetration testing rules of engagement" webpage for the "Microsoft Azure Cloud". Public Cloud service providers always have a disclaimer and some documentation related to what is and what is not allowed when it comes to pen testing cloud resources. So if I scroll down a little bit and start to read this, we can see the scope that is covered by this document for the purposes of pen testing. So, it includes "Microsoft Azure" services. Now, as I scroll further down, it talks about reporting security issues that you might inadvertently discover related to the "Microsoft cloud" computing platform. It's not required, but ideally you would fill out a form and report the security vulnerability to…
内容
-
-
-
-
-
-
(已锁定)
Cloud auditing5 分钟 57 秒
-
(已锁定)
Enable cloud alert notification5 分钟 41 秒
-
(已锁定)
Encryption and the cloud2 分钟 58 秒
-
(已锁定)
Force HTTPS for cloud-hosted web applications7 分钟 20 秒
-
(已锁定)
Deploying a cloud jump box5 分钟 2 秒
-
(已锁定)
Cloud artificial intelligence and machine learning2 分钟 59 秒
-
(已锁定)
Cloud DDoS protection2 分钟 11 秒
-
(已锁定)
Pen testing and the cloud6 分钟 26 秒
-
(已锁定)
Cloud hacking tools8 分钟 15 秒
-
(已锁定)
Cloud security best practices8 分钟 50 秒
-
(已锁定)
-