www.ignitetechnologies.
in
ABOUT
Well-Known Entity for Offensive Security
{Training and Services}
ABOUT US
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out
to be a trusted brand in cyber security training and services
WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
CLOUD
PENTESTING TOPICS
Introduction to Cloud Computing 8 Testing AWS and Configuration
Check
- Cloud computing essentials
- Cloud computing service models - Elastic block storage
- Public - Snapshots
- Private - Retrieving Deleted Data
- Virtual Private - Configuration of firewall
- Hybrid
- Risk analysis 9 Automatic Pentesting
2 Cloud Security Risk Management - Performing an automated
vulnerability assessment
- Divinding operational responsibility and visibility
- Managing user authentication 10 AWS IAM
- Managing user authorization
- Privilege Escalation on AWS Accounts
3 Negotiating Security Requirements - Secret and Access ID
- Persistence
- Identifying needed security measures
- Ensuring SLA meet security requirements 11 Docker Security
- Securing the cloud Infrastructure
- Securing the container Images
4 Securing the Platform
12 AWS Lambda Service
- Restricting network access through security groups
- Configuring platform specific user access control - Writing scripts for lambda
- Integrating cloud authorization systems
13 Pentesting Tools
5 Cloud Pentesting introduction
- AWS Audit Scout suite
- What is cloud pentesting
- Threats of cloud pentesting 14 Attacking AWS logging and Security
- Pre requisites of cloud pentesting
- Services - Pentesting Cloudtrail
6 Lab setup GuardDuty
- Setting up vulnerable instances
- Setting up ubuntu
7 Installation of Vulnerable Services in EC2 instances
- Installation of windows server instance
- Kali installation
- Installation of vulnerable services
CONTACT US
Phone No.
+91 9599 387 41 | +91 1145 1031 30
WhatsApp
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
[email protected]
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/ignitetechnologies