Cloud Penetration Testing
Cloud Penetration Testing
Learn how to effectively pentest AWS, Azure, and GCP applications
Crawley, Kim
Packt Publishing Limited
11/2023
298
Mole
Inglês
9781803248486
15 a 20 dias
Descrição não disponível.
Table of Contents
How Do Enterprises Utilize and Implement Cloud Networks?
How Are Cloud Networks Cyber Attacked?
Key Concepts for Pentesting Today's Cloud Networks
Security Features in AWS
Pentesting AWS Features through Serverless Applications and Tools
Pentesting Containerized Applications in AWS
Security Features in Azure
Pentesting Azure Features through Serverless Applications and Tools
Pentesting Containerized Applications in Azure
Security Features in GCP
Pentesting GCP Features through Serverless Applications and Tools
Pentesting Containerized Applications in GCP
Best Practices and Summary
How Do Enterprises Utilize and Implement Cloud Networks?
How Are Cloud Networks Cyber Attacked?
Key Concepts for Pentesting Today's Cloud Networks
Security Features in AWS
Pentesting AWS Features through Serverless Applications and Tools
Pentesting Containerized Applications in AWS
Security Features in Azure
Pentesting Azure Features through Serverless Applications and Tools
Pentesting Containerized Applications in Azure
Security Features in GCP
Pentesting GCP Features through Serverless Applications and Tools
Pentesting Containerized Applications in GCP
Best Practices and Summary
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
AWS Security; penetration testing book; Azure Security; Web penetration testing; Pentester tools; GCP Security; Cloud Security; Cloud Penetration Testing; GCP Pentesting; AWS Pentesting; Azure Pentesting
Table of Contents
How Do Enterprises Utilize and Implement Cloud Networks?
How Are Cloud Networks Cyber Attacked?
Key Concepts for Pentesting Today's Cloud Networks
Security Features in AWS
Pentesting AWS Features through Serverless Applications and Tools
Pentesting Containerized Applications in AWS
Security Features in Azure
Pentesting Azure Features through Serverless Applications and Tools
Pentesting Containerized Applications in Azure
Security Features in GCP
Pentesting GCP Features through Serverless Applications and Tools
Pentesting Containerized Applications in GCP
Best Practices and Summary
How Do Enterprises Utilize and Implement Cloud Networks?
How Are Cloud Networks Cyber Attacked?
Key Concepts for Pentesting Today's Cloud Networks
Security Features in AWS
Pentesting AWS Features through Serverless Applications and Tools
Pentesting Containerized Applications in AWS
Security Features in Azure
Pentesting Azure Features through Serverless Applications and Tools
Pentesting Containerized Applications in Azure
Security Features in GCP
Pentesting GCP Features through Serverless Applications and Tools
Pentesting Containerized Applications in GCP
Best Practices and Summary
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.