-
Book Overview & Buying
-
Table Of Contents
Cloud Penetration Testing
By :
Cloud Penetration Testing
By:
Overview of this book
With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively.
In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.
By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.
Table of Contents (20 chapters)
Preface
Part 1: Today’s Cloud Networks and Their Security Implications
Chapter 1: How Do Enterprises Utilize and Implement Cloud Networks?
Chapter 2: How Are Cloud Networks Cyber Attacked?
Chapter 3: Key Concepts for Pentesting Today’s Cloud Networks
Part 2: Pentesting AWS
Chapter 4: Security Features in AWS
Chapter 5: Pentesting AWS Features through Serverless Applications and Tools
Chapter 6: Pentesting Containerized Applications in AWS
Part 3: Pentesting Microsoft Azure
Chapter 7: Security Features in Azure
Chapter 8: Pentesting Azure Features through Serverless Applications and Tools
Chapter 9: Pentesting Containerized Applications in Azure
Part 4: Pentesting GCP
Chapter 10: Security Features in GCP
Chapter 11: Pentesting GCP Features through Serverless Applications and Tools
Chapter 12: Pentesting Containerized Applications in GCP
Chapter 13: Best Practices and Summary
Index