Red Team Operations in Cloud Environments - Emulating Adversaries in AWS
Ekoparty Security Conference via YouTube
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced red team methodologies specifically designed for AWS cloud environments in this comprehensive conference talk that demonstrates how modern adversaries exploit cloud infrastructures. Learn to simulate real-world attack scenarios from initial reconnaissance through establishing persistence, focusing on weak configurations, exposed credentials, and insecure cloud services that attackers commonly target. Discover privilege escalation techniques, lateral movement strategies, and persistence mechanisms unique to AWS while examining tactics, techniques, and procedures (TTPs) aligned with the MITRE ATT&CK framework for cloud environments. Master the use of specialized tools and frameworks that automate adversary emulation in cloud settings, and understand how to integrate these red team operations into purple team exercises for comprehensive security validation. Gain practical insights into common exploitation techniques used against AWS infrastructure and learn how to leverage these operations to strengthen your organization's cloud security posture, improve detection capabilities, and build resilience against advanced persistent threats targeting cloud environments.
Syllabus
Red Team Operations in Cloud Environments: Emulating Adversaries in AWS - Galoget Latorre
Taught by
Ekoparty Security Conference