reklama - zainteresowany?

Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments - Second Edition - Helion

Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments - Second Edition
ebook
Autor: David Okeyode, Rogier Dijkman, Karl Fosaaen
Tytuł oryginału: Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments - Second Edition
ISBN: 9781835880593
Format: ebook
Księgarnia: Helion

Cena książki: 139,00 zł

Książka będzie dostępna od października 2025

The rapid growth of cloud computing and Microsoft Azure’s vast capabilities have made it a prime target for attackers. Penetration Testing Azure for Ethical Hackers is your hands-on guide to staying ahead of these threats by learning how to identify and fix vulnerabilities before they’re exploited.
Building on the success of its predecessor, this second edition is fully updated to cover modern attack strategies, sophisticated privilege escalation methods, and emerging Azure security challenges. Starting with the setting up of a dedicated Azure penetration testing environment, the book systematically guides you through reconnaissance methods, lateral movement tactics, and persistence techniques specifically engineered for Azure cloud environments. Through real-world case studies, step-by-step attack simulations, and mitigation strategies, you’ll develop practical skills for strengthening your organization's security posture.
By the end, you’ll be equipped with the knowledge and technical skills needed to perform advanced Azure security assessments effectively.

Spis treści

Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments - Second Edition eBook -- spis treści

  • 1. Azure Platform and Architecture Overview
  • 2. Building Your Azure Pentesting Environment
  • 3. Anonymous Discovery and Reconnaissance
  • 4. Initial Access and Credential Theft
  • 5. Privilege Escalation Attacks
  • 6. Hunting and Harvesting Service Credentials
  • 7. Data Exfiltration Attacks
  • 8. Code Execution Attacks
  • 9. Persistence Attacks and Defense Evasion

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2025 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.