CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications

Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively Key Features Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform Underst...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Crawley, Kim (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing Ltd. 2023
Ausgabe:1st edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-100065627
003 DE-627-1
005 20240228122102.0
007 cr uuu---uuuuu
008 240104s2023 xx |||||o 00| ||eng c
020 |a 9781803248868  |c electronic bk.  |9 978-1-80324-886-8 
020 |a 1803248866  |c electronic bk.  |9 1-80324-886-6 
020 |a 9781803248486  |9 978-1-80324-848-6 
035 |a (DE-627-1)100065627 
035 |a (DE-599)KEP100065627 
035 |a (ORHE)9781803248486 
035 |a (DE-627-1)100065627 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 004.67/82  |2 23/eng/20231205 
100 1 |a Crawley, Kim  |e VerfasserIn  |4 aut 
245 1 0 |a CLOUD PENETRATION TESTING FOR RED TEAMERS  |b learn how to effectively pentest AWS, Azure, and GCP applications  |c Kim Crawley 
250 |a 1st edition. 
264 1 |a Birmingham, UK  |b Packt Publishing Ltd.  |c 2023 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively Key Features Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes) Get acquainted with the penetration testing tools and security measures specific to each platform Purchase of the print or Kindle book includes a free PDF eBook Book Description With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively. In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. What you will learn Familiarize yourself with the evolution of cloud networks Navigate and secure complex environments that use more than one cloud service Conduct vulnerability assessments to identify weak points in cloud configurations Secure your cloud infrastructure by learning about common cyber attack techniques Explore various strategies to successfully counter complex cloud attacks Delve into the most common AWS, Azure, and GCP services and their applications for businesses Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting Who this book is for This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms--AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills. 
650 0 |a Cloud computing  |x Security measures 
650 0 |a Cloud computing  |x Testing 
650 0 |a Computer security 
776 1 |z 1803248483 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1803248483 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781803248486/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-100065627
_version_ 1818767374276362240
adam_text
any_adam_object
author Crawley, Kim
author_facet Crawley, Kim
author_role aut
author_sort Crawley, Kim
author_variant k c kc
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)100065627
(DE-599)KEP100065627
(ORHE)9781803248486
dewey-full 004.67/82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004.67/82
dewey-search 004.67/82
dewey-sort 14.67 282
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1st edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04187cam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-100065627</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122102.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240104s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803248868</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-80324-886-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803248866</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-80324-886-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803248486</subfield><subfield code="9">978-1-80324-848-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100065627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100065627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781803248486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100065627</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23/eng/20231205</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Crawley, Kim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CLOUD PENETRATION TESTING FOR RED TEAMERS</subfield><subfield code="b">learn how to effectively pentest AWS, Azure, and GCP applications</subfield><subfield code="c">Kim Crawley</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively Key Features Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes) Get acquainted with the penetration testing tools and security measures specific to each platform Purchase of the print or Kindle book includes a free PDF eBook Book Description With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively. In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. What you will learn Familiarize yourself with the evolution of cloud networks Navigate and secure complex environments that use more than one cloud service Conduct vulnerability assessments to identify weak points in cloud configurations Secure your cloud infrastructure by learning about common cyber attack techniques Explore various strategies to successfully counter complex cloud attacks Delve into the most common AWS, Azure, and GCP services and their applications for businesses Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting Who this book is for This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms--AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1803248483</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1803248483</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781803248486/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-100065627
illustrated Not Illustrated
indexdate 2024-12-18T08:48:52Z
institution BVB
isbn 9781803248868
1803248866
9781803248486
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2023
publishDateSearch 2023
publishDateSort 2023
publisher Packt Publishing Ltd.
record_format marc
spelling Crawley, Kim VerfasserIn aut
CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
1st edition.
Birmingham, UK Packt Publishing Ltd. 2023
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectively Key Features Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes) Get acquainted with the penetration testing tools and security measures specific to each platform Purchase of the print or Kindle book includes a free PDF eBook Book Description With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively. In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments. What you will learn Familiarize yourself with the evolution of cloud networks Navigate and secure complex environments that use more than one cloud service Conduct vulnerability assessments to identify weak points in cloud configurations Secure your cloud infrastructure by learning about common cyber attack techniques Explore various strategies to successfully counter complex cloud attacks Delve into the most common AWS, Azure, and GCP services and their applications for businesses Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting Who this book is for This book is for pentesters, aspiring pentesters, and red team members seeking specialized skills for leading cloud platforms--AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.
Cloud computing Security measures
Cloud computing Testing
Computer security
1803248483
Erscheint auch als Druck-Ausgabe 1803248483
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781803248486/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Crawley, Kim
CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications
Cloud computing Security measures
Cloud computing Testing
Computer security
title CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications
title_auth CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications
title_exact_search CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications
title_full CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
title_fullStr CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
title_full_unstemmed CLOUD PENETRATION TESTING FOR RED TEAMERS learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
title_short CLOUD PENETRATION TESTING FOR RED TEAMERS
title_sort cloud penetration testing for red teamers learn how to effectively pentest aws azure and gcp applications
title_sub learn how to effectively pentest AWS, Azure, and GCP applications
topic Cloud computing Security measures
Cloud computing Testing
Computer security
topic_facet Cloud computing Security measures
Cloud computing Testing
Computer security
url https://learning.oreilly.com/library/view/-/9781803248486/?ar
work_keys_str_mv AT crawleykim cloudpenetrationtestingforredteamerslearnhowtoeffectivelypentestawsazureandgcpapplications