Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic Video |
Language: | English |
Published: |
[Birmingham, United Kingdom]
Packt Publishing
[2024]
|
Edition: | [First edition]. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781836200277/?ar |
Summary: | The "Introduction to AWS Pentesting" course offers a detailed exploration into the specialized field of penetration testing within Amazon Web Services (AWS), providing a strategic blend of policy understanding, technical insights, and hands-on techniques. Beginning with a crucial overview of AWS Pentesting Policy, the course outlines the legal landscape, guiding participants on what is permissible in the realm of AWS security testing. This foundational knowledge is vital for conducting responsible and effective penetration testing activities. As participants progress through the series, they delve deeper into the mechanics of AWS, with specific episodes dedicated to understanding and exploiting vulnerabilities in key services such as IAM, S3, EC2, and Lambda. In addition to technical skills, the course fosters a comprehensive understanding of AWS resource naming with ARNs, enhancing the ability to navigate and manipulate AWS architecture for security testing purposes. By the end of the series, participants will not only be prepared to spot and mitigate security risks but also to leverage AWS features and tools to strengthen infrastructure against future threats. |
Item Description: | Online resource; title from title details screen (O'Reilly, viewed May 7, 2024) |
Physical Description: | 1 online resource (1 video file (8 hr., 49 min.)) sound, color. |
ISBN: | 9781836200277 1836200277 |
Staff View
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-103622276 | ||
003 | DE-627-1 | ||
005 | 20240603113657.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240603s2024 xx ||| |o o ||eng c | ||
020 | |a 9781836200277 |c electronic video |9 978-1-83620-027-7 | ||
020 | |a 1836200277 |c electronic video |9 1-83620-027-7 | ||
035 | |a (DE-627-1)103622276 | ||
035 | |a (DE-599)KEP103622276 | ||
035 | |a (ORHE)9781836200277 | ||
035 | |a (DE-627-1)103622276 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240507 | |
245 | 0 | 0 | |a Introduction to AWS pentesting |c ACI Learning, Daniel Lowrie, Sophie Goodwin |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing |c [2024] | |
300 | |a 1 online resource (1 video file (8 hr., 49 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed May 7, 2024) | ||
520 | |a The "Introduction to AWS Pentesting" course offers a detailed exploration into the specialized field of penetration testing within Amazon Web Services (AWS), providing a strategic blend of policy understanding, technical insights, and hands-on techniques. Beginning with a crucial overview of AWS Pentesting Policy, the course outlines the legal landscape, guiding participants on what is permissible in the realm of AWS security testing. This foundational knowledge is vital for conducting responsible and effective penetration testing activities. As participants progress through the series, they delve deeper into the mechanics of AWS, with specific episodes dedicated to understanding and exploiting vulnerabilities in key services such as IAM, S3, EC2, and Lambda. In addition to technical skills, the course fosters a comprehensive understanding of AWS resource naming with ARNs, enhancing the ability to navigate and manipulate AWS architecture for security testing purposes. By the end of the series, participants will not only be prepared to spot and mitigate security risks but also to leverage AWS features and tools to strengthen infrastructure against future threats. | ||
610 | 1 | 0 | |a Amazon Web Services (Firm) |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Cloud computing | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
700 | 1 | |a Goodwin, Sophie |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781836200277/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-103622276 |
---|---|
_version_ | 1833357137847255041 |
adam_text | |
any_adam_object | |
author2 | Lowrie, Daniel Goodwin, Sophie |
author2_role | ctb ctb |
author2_variant | d l dl s g sg |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Lowrie, Daniel Goodwin, Sophie ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)103622276 (DE-599)KEP103622276 (ORHE)9781836200277 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03196ngm a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-103622276</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240603113657.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240603s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781836200277</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83620-027-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1836200277</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83620-027-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)103622276</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP103622276</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781836200277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)103622276</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240507</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Introduction to AWS pentesting</subfield><subfield code="c">ACI Learning, Daniel Lowrie, Sophie Goodwin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 video file (8 hr., 49 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed May 7, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The "Introduction to AWS Pentesting" course offers a detailed exploration into the specialized field of penetration testing within Amazon Web Services (AWS), providing a strategic blend of policy understanding, technical insights, and hands-on techniques. Beginning with a crucial overview of AWS Pentesting Policy, the course outlines the legal landscape, guiding participants on what is permissible in the realm of AWS security testing. This foundational knowledge is vital for conducting responsible and effective penetration testing activities. As participants progress through the series, they delve deeper into the mechanics of AWS, with specific episodes dedicated to understanding and exploiting vulnerabilities in key services such as IAM, S3, EC2, and Lambda. In addition to technical skills, the course fosters a comprehensive understanding of AWS resource naming with ARNs, enhancing the ability to navigate and manipulate AWS architecture for security testing purposes. By the end of the series, participants will not only be prepared to spot and mitigate security risks but also to leverage AWS features and tools to strengthen infrastructure against future threats.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">Amazon Web Services (Firm)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goodwin, Sophie</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781836200277/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-103622276 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:46:55Z |
institution | BVB |
isbn | 9781836200277 1836200277 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 video file (8 hr., 49 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | Introduction to AWS pentesting ACI Learning, Daniel Lowrie, Sophie Goodwin [First edition]. [Birmingham, United Kingdom] Packt Publishing [2024] 1 online resource (1 video file (8 hr., 49 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed May 7, 2024) The "Introduction to AWS Pentesting" course offers a detailed exploration into the specialized field of penetration testing within Amazon Web Services (AWS), providing a strategic blend of policy understanding, technical insights, and hands-on techniques. Beginning with a crucial overview of AWS Pentesting Policy, the course outlines the legal landscape, guiding participants on what is permissible in the realm of AWS security testing. This foundational knowledge is vital for conducting responsible and effective penetration testing activities. As participants progress through the series, they delve deeper into the mechanics of AWS, with specific episodes dedicated to understanding and exploiting vulnerabilities in key services such as IAM, S3, EC2, and Lambda. In addition to technical skills, the course fosters a comprehensive understanding of AWS resource naming with ARNs, enhancing the ability to navigate and manipulate AWS architecture for security testing purposes. By the end of the series, participants will not only be prepared to spot and mitigate security risks but also to leverage AWS features and tools to strengthen infrastructure against future threats. Amazon Web Services (Firm) Penetration testing (Computer security) Computer networks Security measures Cloud computing Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Lowrie, Daniel MitwirkendeR ctb Goodwin, Sophie MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | Introduction to AWS pentesting Amazon Web Services (Firm) Penetration testing (Computer security) Computer networks Security measures Cloud computing Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Introduction to AWS pentesting |
title_auth | Introduction to AWS pentesting |
title_exact_search | Introduction to AWS pentesting |
title_full | Introduction to AWS pentesting ACI Learning, Daniel Lowrie, Sophie Goodwin |
title_fullStr | Introduction to AWS pentesting ACI Learning, Daniel Lowrie, Sophie Goodwin |
title_full_unstemmed | Introduction to AWS pentesting ACI Learning, Daniel Lowrie, Sophie Goodwin |
title_short | Introduction to AWS pentesting |
title_sort | introduction to aws pentesting |
topic | Amazon Web Services (Firm) Penetration testing (Computer security) Computer networks Security measures Cloud computing Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Amazon Web Services (Firm) Penetration testing (Computer security) Computer networks Security measures Cloud computing Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT lowriedaniel introductiontoawspentesting AT goodwinsophie introductiontoawspentesting AT acilearningfirm introductiontoawspentesting AT packtpublishing introductiontoawspentesting |