Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Introduction
00:00 • 5min
Pen Penetration Testing in AWS
04:36 • 2min
Web App and Testing and Cloud and Testing
06:15 • 2min
What Is AWS Code?
08:37 • 4min
Pen Testing AWS S3 - What's the Difference?
13:06 • 2min
Deploying a Complex Application for AWS, Is That Right?
15:19 • 3min
Cloud Penetration Testing Tools - What Are They Used For?
18:13 • 3min
What's the Difference Between AWS Lambda and OAuth Top 10?
20:51 • 4min
The AWS Hacker Attack - Cloud Is Fishing
24:41 • 4min
AWS Go to Similar - Is That Right?
29:06 • 3min
AWS Cloud Share
31:53 • 2min
Cloud Pen Testing
33:29 • 2min
AWS Serverless - What's the Thinking Behind That?
35:31 • 4min
Is It the Same for ECS?
39:40 • 2min
Container Post Management
41:12 • 2min
The Security of ECS Containers
42:50 • 2min
The Cat Model - Control Over Machine
44:48 • 2min
AWS Code - What's the Future Plan?
47:16 • 2min
What's It Like to Do Penetration Testing Cloud World?
49:25 • 2min
AWS Cloud Penetration Testing - What's Your Favorite?
51:03 • 2min