Amazon Web Services774 тыс
Опубликовано 30 ноября 2018, 20:39
Red teamers, penetration testers, and attackers can leverage the same tools used by developers to attack AWS accounts. In this session, two technical security experts demonstrate how an attacker can perform reconnaissance and pivoting on AWS, leverage network, AWS Lambda functions, and implementation weaknesses to steal credentials and data. They then show you how to defend your environment from these threats.
Learn More: aws.amazon.com/developer/commu...
Catch up on the excitement of re:Invent 2018 with the AWS launchpad featuring launch announcements, demos of newly launched technology, interviews with expert guests and live Q&A. AWS re:Invent is a tech education conference for the global cloud computing community hosted by Amazon Web Services. See all recordings of the AWS Launchpad at re:Invent here: youtube.com/playlist?list=PLhr... and learn more about AWS live streaming here: aws.amazon.com/twitch.
Learn More: aws.amazon.com/developer/commu...
Catch up on the excitement of re:Invent 2018 with the AWS launchpad featuring launch announcements, demos of newly launched technology, interviews with expert guests and live Q&A. AWS re:Invent is a tech education conference for the global cloud computing community hosted by Amazon Web Services. See all recordings of the AWS Launchpad at re:Invent here: youtube.com/playlist?list=PLhr... and learn more about AWS live streaming here: aws.amazon.com/twitch.
Свежие видео
Случайные видео