0% found this document useful (0 votes)
76 views4 pages

Cloud Pentesting

This document provides information about Ignite Technologies, a well-known entity for offensive security training and services. It offers cloud pentesting topics and training to college students, IT specialists, auditors, managers, and practitioners to level up their fundamental knowledge through hands-on practical sessions using recorded videos and a common discussion platform. Topics include introduction to cloud computing, AWS security, Docker security, pentesting tools, attacking AWS services, and setting up vulnerable instances on EC2. Contact details are also provided.

Uploaded by

Alfasentauriu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views4 pages

Cloud Pentesting

This document provides information about Ignite Technologies, a well-known entity for offensive security training and services. It offers cloud pentesting topics and training to college students, IT specialists, auditors, managers, and practitioners to level up their fundamental knowledge through hands-on practical sessions using recorded videos and a common discussion platform. Topics include introduction to cloud computing, AWS security, Docker security, pentesting tools, attacking AWS services, and setting up vulnerable instances on EC2. Contact details are also provided.

Uploaded by

Alfasentauriu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

www.ignitetechnologies.

in
ABOUT
Well-Known Entity for Offensive Security

{Training and Services}

ABOUT US
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out
to be a trusted brand in cyber security training and services

WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
CLOUD
PENTESTING TOPICS

Introduction to Cloud Computing 8 Testing AWS and Configuration


Check
- Cloud computing essentials
- Cloud computing service models - Elastic block storage
- Public - Snapshots
- Private - Retrieving Deleted Data
- Virtual Private - Configuration of firewall
- Hybrid
- Risk analysis 9 Automatic Pentesting

2 Cloud Security Risk Management - Performing an automated


vulnerability assessment
- Divinding operational responsibility and visibility
- Managing user authentication 10 AWS IAM
- Managing user authorization
- Privilege Escalation on AWS Accounts
3 Negotiating Security Requirements - Secret and Access ID
- Persistence
- Identifying needed security measures
- Ensuring SLA meet security requirements 11 Docker Security
- Securing the cloud Infrastructure
- Securing the container Images
4 Securing the Platform
12 AWS Lambda Service
- Restricting network access through security groups
- Configuring platform specific user access control - Writing scripts for lambda
- Integrating cloud authorization systems
13 Pentesting Tools
5 Cloud Pentesting introduction
- AWS Audit Scout suite
- What is cloud pentesting
- Threats of cloud pentesting 14 Attacking AWS logging and Security
- Pre requisites of cloud pentesting
- Services - Pentesting Cloudtrail
6 Lab setup GuardDuty

- Setting up vulnerable instances


- Setting up ubuntu

7 Installation of Vulnerable Services in EC2 instances

- Installation of windows server instance


- Kali installation
- Installation of vulnerable services
CONTACT US

Phone No.
+91 9599 387 41 | +91 1145 1031 30

WhatsApp
https://wa.me/message/HIOPPNENLOX6F1

EMAIL ADDRESS
info@ignitetechnologies.in

WEBSITE
www.ignitetechnologies.in

BLOG
www.hackingarticles.in

LINKEDIN
https://www.linkedin.com/company/hackingarticles/

TWITTER
https://twitter.com/hackinarticles

GITHUB
https://github.com/ignitetechnologies

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy