Learn Generative AI, Prompt Engineering, and LLMs for Free
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore cloud hacking techniques without malware in this 27-minute conference talk from Nahamcon 2022. Dive into various hacking types, state actors, and cloud exploitation methods. Learn about Crowdstrike, zero trust principles, and cloud APIs. Discover strategies for gaining an initial foothold in cloud environments. Gain insights into offensive security practices and understand the evolving landscape of cloud-based threats.
Syllabus
Intro
Types of hacking
State actors
Cloud exploitation
Crowdstrike
Zero trust
Cloud APIs
Initial foothold
Taught by
NahamSec