Part 1: Today’s Cloud Networks and Their Security Implications
Pentesters and red teams test the security of computer systems. In this book, the types of computer systems you will learn how to pentest are cloud applications and networks. Before you start testing something, you should understand what it is that you’re testing in the first place! So, in this part, we will learn all about the different types of cloud services and applications, why organizations use them, and how they’re configured and deployed. We will also learn about the basics of pentesting and red teams. This knowledge will set a foundation for everything else that you’ll learn in this book.
This section has the following chapters:
- Chapter 1, How Do Enterprises Utilize and Implement Cloud Networks?
- Chapter 2, How Are Cloud Networks Cyber Attacked?
- Chapter 3, Key Concepts for Pentesting Today’s Cloud Networks