Table of Contents
Preface
Part 1: A Gentle Introduction to Vulnerable-by-Design Environments
1
Getting Started with Penetration Testing Labs in the Cloud
Why build your penetration testing labs in the cloud?
Recognizing the impact of cloud computing on the cybersecurity landscape
Exploring how modern cloud applications are designed, developed, and deployed
Examining the considerations when building penetration testing lab environments in the cloud
Summary
Further reading
2
Preparing Our First Vulnerable Cloud Lab Environment
Technical requirements
Designing our first cloud penetration testing lab environment
Preparing our first vulnerable environment
Creating an empty S3 bucket
Configuring the S3 bucket to host a static website
Updating the ...
Get Building and Automating Penetration Testing Labs in the Cloud now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.