Dekorationsartikel gehören nicht zum Leistungsumfang.
Cloud Penetration Testing for Red Teamers
Learn how to effectively pentest AWS, Azure, and GCP applications
Taschenbuch von Kim Crawley
Sprache: Englisch

59,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively

Key Features:

Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform
Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)
Get acquainted with the penetration testing tools and security measures specific to each platform
Purchase of the print or Kindle book includes a free PDF eBook

Book Description:

With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively.

In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.

By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.

What You Will Learn:

Familiarize yourself with the evolution of cloud networks
Navigate and secure complex environments that use more than one cloud service
Conduct vulnerability assessments to identify weak points in cloud configurations
Secure your cloud infrastructure by learning about common cyber attack techniques
Explore various strategies to successfully counter complex cloud attacks
Delve into the most common AWS, Azure, and GCP services and their applications for businesses
Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting

Who this book is for:

This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.
Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively

Key Features:

Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform
Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)
Get acquainted with the penetration testing tools and security measures specific to each platform
Purchase of the print or Kindle book includes a free PDF eBook

Book Description:

With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively.

In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.

By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.

What You Will Learn:

Familiarize yourself with the evolution of cloud networks
Navigate and secure complex environments that use more than one cloud service
Conduct vulnerability assessments to identify weak points in cloud configurations
Secure your cloud infrastructure by learning about common cyber attack techniques
Explore various strategies to successfully counter complex cloud attacks
Delve into the most common AWS, Azure, and GCP services and their applications for businesses
Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting

Who this book is for:

This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.
Über den Autor
Kim Crawley is a thought leader in cybersecurity, from pentesting to defensive security, and from policy to cyber threat research. For nearly a decade, she has contributed her research and writing to the official corporate blogs of AT&T Cybersecurity, BlackBerry, Venafi, Sophos, CloudDefense, and many others. She has been an internal employee of both Hack The Box and IOActive, a leading cybersecurity research firm.With the hacker mindset, she hacked her way into various information security subject matters. She co-authored one of the most popular guides to pentester careers on Amazon, The Pentester Blueprint, with Philip Wylie for Wiley Tech. She wrote an introductory guide to cybersecurity for business, 8 Steps to Better Security, which was also published by Wiley Tech. She also wrote Hacker Culture: A to Z for O'Reilly Media.To demonstrate her knowledge of cybersecurity operations, she passed her CISSP exam in 2023. In her spare time, she loves playing Japanese RPGs and engaging in social justice advocacy. She's always open to new writing, research, and security practitioner opportunities.
Details
Erscheinungsjahr: 2023
Fachbereich: EDV
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Thema: Lexika
Medium: Taschenbuch
Seiten: 298
ISBN-13: 9781803248486
ISBN-10: 1803248483
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Crawley, Kim
Hersteller: Packt Publishing
Maße: 235 x 191 x 16 mm
Von/Mit: Kim Crawley
Erscheinungsdatum: 24.11.2023
Gewicht: 0,561 kg
preigu-id: 128044375
Über den Autor
Kim Crawley is a thought leader in cybersecurity, from pentesting to defensive security, and from policy to cyber threat research. For nearly a decade, she has contributed her research and writing to the official corporate blogs of AT&T Cybersecurity, BlackBerry, Venafi, Sophos, CloudDefense, and many others. She has been an internal employee of both Hack The Box and IOActive, a leading cybersecurity research firm.With the hacker mindset, she hacked her way into various information security subject matters. She co-authored one of the most popular guides to pentester careers on Amazon, The Pentester Blueprint, with Philip Wylie for Wiley Tech. She wrote an introductory guide to cybersecurity for business, 8 Steps to Better Security, which was also published by Wiley Tech. She also wrote Hacker Culture: A to Z for O'Reilly Media.To demonstrate her knowledge of cybersecurity operations, she passed her CISSP exam in 2023. In her spare time, she loves playing Japanese RPGs and engaging in social justice advocacy. She's always open to new writing, research, and security practitioner opportunities.
Details
Erscheinungsjahr: 2023
Fachbereich: EDV
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Thema: Lexika
Medium: Taschenbuch
Seiten: 298
ISBN-13: 9781803248486
ISBN-10: 1803248483
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Crawley, Kim
Hersteller: Packt Publishing
Maße: 235 x 191 x 16 mm
Von/Mit: Kim Crawley
Erscheinungsdatum: 24.11.2023
Gewicht: 0,561 kg
preigu-id: 128044375
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte