0
نام کتاب
Cloud Penetration Testing for Red Teamers

Learn how to effectively pentest AWS, Azure, and GCP applications

Kim Crawley

Paperback298 Pages
PublisherPackt
Edition1
LanguageEnglish
Year2023
ISBN9781803248486
1K
A4426
انتخاب نوع چاپ:
جلد سخت
608,000ت
0
جلد نرم
528,000ت
0
طلق پاپکو و فنر
538,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:دارای متن و کادر رنگی
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Cloud

#Penetration_Testing

#Azure

#AWS

#GCP

توضیحات

Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization’s network by pentesting AWS, Azure, and GCP effectively


Key Features

  • Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform
  • Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)
  • Get acquainted with the penetration testing tools and security measures specific to each platform


Book Description

With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively.


In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.

By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.


What you will learn

  • Familiarize yourself with the evolution of cloud networks
  • Navigate and secure complex environments that use more than one cloud service
  • Conduct vulnerability assessments to identify weak points in cloud configurations
  • Secure your cloud infrastructure by learning about common cyber attack techniques
  • Explore various strategies to successfully counter complex cloud attacks
  • Delve into the most common AWS, Azure, and GCP services and their applications for businesses
  • Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting


Who this book is for

This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms—AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.


Table of Contents

  1. How Do Enterprises Utilize and Implement Cloud Networks?
  2. How Are Cloud Networks Cyber Attacked?
  3. Key Concepts for Pentesting Today’s Cloud Networks
  4. Security Features in AWS
  5. Pentesting AWS Features through Serverless Applications and Tools
  6. Pentesting Containerized Applications in AWS
  7. Security Features in Azure
  8. Pentesting Azure Features through Serverless Applications and Tools
  9. Pentesting Containerized Applications in Azure
  10. Security Features in GCP
  11. Pentesting GCP Features through Serverless Applications and Tools
  12. Pentesting Containerized Applications in GCP
  13. Best Practices and Summary


About the Author

Kim Crawley is a prolific writer and researcher who specializes in cybersecurity. She has spent many years writing blogs and whitepapers for tech companies, some of the most notable include AT&T, BlackBerry, NGINX, and Synack. While writing two books simultaneously in 2023, she took the ISC2 CISSP exam and passed on her first try.


Her previous appearances on bookshelves include coauthoring The Pentester Blueprint, and authoring 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business. In addition to writing books, Kim divides her time between writing blogs and whitepapers for cybersecurity firms, playing video games, and reading books about fashion designers, rock musicians, and Japanese culture.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
Cloud
813
CompTIA Cloud+ Guide to Cloud Computing
1,294,000 تومان
Cloud
936
Cloud Native Architecture and Design
1,216,000 تومان
Cloud
991
Building Intelligent Cloud Applications
355,000 تومان
Cloud
934
Cloud Native Transformation
988,000 تومان
DevOps
1,686
Google Cloud for DevOps Engineers
750,000 تومان
Cloud
2,416
Effortless Cloud-Native App Development Using Skaffold
551,000 تومان
Artificial intelligence
962
Artificial Intelligence for Cloud and Edge Computing
600,000 تومان
Cloud
1,274
Cloud Native DevOps with Kubernetes
598,000 تومان
Java
535
Optimizing Cloud Native Java
767,000 تومان
Cloud
517
Cloud Native Application Protection Platforms
419,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©