Inside the Red Team: How Attackers Exploit Cloud Infrastructure

Cloud environments have become prime targets for sophisticated adversaries. In this deep dive, we’ll step into the attacker’s shoes to explore how Red Teams simulate real-world threats against cloud infrastructure.

From initial reconnaissance to privilege escalation and data exfiltration, you’ll see the tactics, techniques, and procedures (TTPs) attackers use to compromise cloud systems.

This session will help defenders anticipate, detect, and mitigate these threats by understanding the attacker’s playbook.

 

Key Learning Objectives

Understand the Attack Lifecycle
Explore Common Attack Vectors
Analyze Real-World Red Team Techniques
Strengthen Defensive Strategies
Adopt an Attacker Mindset
 

Preduslovi za praćenje predavanja / potrebno predznanje
understanding of cloud environments, general cybersecurity concepts, and common security terminology