Power BI Fundamentals - Create visualizations and dashboards from scratch
Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how cybercriminals exploit legitimate cloud APIs to establish covert command and control (C2) channels in this 30-minute security presentation by Cooper. Discover the emerging tactics used by malware operators to abuse trusted cloud services and APIs for malicious communications, bypassing traditional security detection methods. Explore the technical mechanisms behind these attacks, understand how legitimate cloud infrastructure can be weaponized for malicious purposes, and examine the challenges this presents for cybersecurity professionals. Gain insights into the evolving landscape of cloud-based malware operations and the innovative approaches attackers use to maintain persistent, stealthy communication channels with their malicious payloads.
Syllabus
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc
Taught by
Cooper