INE Training Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • INE Training Notes
  • Courses
    • eJPT - PTSv2
      • 📒Penetration Testing Prerequisites
        • Introduction
        • Networking
        • Web Applications
      • 📒1. Assessment Methodologies & Auditing
        • Information Gathering
        • Footprinting & Scanning
        • Enumeration
          • 🔬SMB Enum
          • 🔬FTP Enum
          • 🔬SSH Enum
          • 🔬HTTP Enum
          • 🔬MYSQL Enum
          • 🔬SMTP Enum
        • Vulnerability Assessment
        • Auditing Fundamentals
      • 📒2. Host & Network Penetration Testing
        • System/Host Based Attacks
          • 🪟Windows Attacks
            • 🔬IIS - WebDAV
            • 🔬SMB - PsExec
            • 🔬RDP
            • 🔬WinRM
            • 🔬Win Kernel Privesc
            • 🔬UAC Bypass
            • 🔬Access Token
            • 🔬Alternate Data Stream
            • 🔬Credentials Dumping
          • 🐧Linux Attacks
            • 🔬Bash
            • 🔬FTP
            • 🔬SSH
            • 🔬SAMBA
            • 🔬Cron Jobs
            • 🔬SUID
            • 🔬Hashes Dumping
        • Network Based Attacks
          • 🔬Tshark, ARP, WiFi
        • The Metasploit Framework (MSF)
          • 🔬HFS - MSF Exploit
          • 🔬Tomcat - MSF Exploit
          • 🔬FTP - MSF Exploit
          • 🔬Samba - MSF Exploit
          • 🔬SSH - MSF Exploit
          • 🔬SMTP - MSF Exploit
          • 🔬Meterpreter - MSF
          • 🔬Win Post Exploitation - MSF
          • 🔬Linux Post Exploitation - MSF
        • Exploitation
          • 🔬Fixing Exploits - HFS
          • 🔬Win Workflow Platform - MSF
          • 🔬Win Black Box Pentest
          • 🔬Linux Black Box Pentest
        • Post-Exploitation
          • 🔬Windows Post-Exploitation
          • 🔬Windows Privilege Escalation
          • 🔬Windows Persistence
          • 🔬Linux Post-Exploitation
          • 🔬Linux Privilege Escalation
          • 🔬Linux Persistence
          • 🔬Cracking Hashes
          • 🔬Pivoting
        • Social Engineering
      • 📒3. Web Application Penetration Testing
        • Intro to Web App Pentesting
          • 🔬HTTP Enumeration
          • 🔬Web App Scanning
          • 🔬Web App Attacks
      • 🔬Exam Preparation - Labs
        • PTSv1 Prerequisites Labs
          • 🔬HTTP(S) Traffic Sniffing
          • 🔬Find the Secret Server
          • 🔬Data Exfiltration
          • 🔬Burp Suite Basics - Directory Enumeration
        • PTSv2 Practice Labs
      • 🌐eJPT References
      • 📜eJPT Cheat Sheet
    • ICCA
      • 📒1. Cloud Foundations
      • 📒2. Cloud Management Concepts
      • 📒3. Cloud Identity, Security, and Compliance
      • 🌐Icca References
    • eMAPT
      • 📒Android
      • 📒iOS
      • 🌐eMAPT References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Cloud Foundations
  • Management
  • Services
  • Cloud Management
  • Monitoring
  • Identity
  • Security
  • Attacks & Defense
  • Resource Protection
  • Compliance

Was this helpful?

Edit on GitHub
  1. Courses
  2. ICCA

Icca References

Previous📒3. Cloud Identity, Security, and ComplianceNexteMAPT

Last updated 1 year ago

Was this helpful?

Cloud Foundations

Management

Services

Cloud Management

Monitoring

Identity

Security

Attacks & Defense

Resource Protection

Compliance


🌐
Cloud Native Wiki - aquasec.com
Cloud Computing Architecture
The Cloud Management Plane
SaaS vs PaaS vs IaaS: What’s The Difference & How To Choose
Infrastructure as a Service (IaaS) vs Platform as a Service (PaaS)
Cloud Market Share
IDC - Worldwide Public Cloud Services Revenue and Year-over-Year Growth 2021
Amazon Web Services (AWS)
Microsoft Azure
Google Cloud Platform (GCP)
CapEx vs OpEx in Cloud Computing
AWS CLI
Azure Command Line tools
Google Cloud SDK
What is a REST API?
Google Cloud APIs
Postman tool
Azure Pricing Calculator
AWS Pricing Calculator
Google Cloud Pricing Calculator
AWS - Service Level Agreements (SLAs)
Azure - Service Level Agreements (SLA) for Online Services
Google Cloud Platform - Service Level Agreements
A Comparison of AWS vs Azure vs Google - VMware Blogs
Serverless Computing on AWS, Azure, and Google Cloud
Top 14 SaaS Application Examples - Successful Strategies
Shared Responsibility Model - Crowdstrike
AWS Share Responsibility Model
Azure Shared responsibility in the cloud
NIST Cloud Computing Standards Roadmap
Cloud Workload Security - Cyberark
Resource Management Models in Cloud Computing - geeksforgeeks.org
Google Cloud Monitoring
AWS CloudWatch
Azure Monitor
Google Identity and Access Management
Google Cloud IAM
Azure Identity
Azure AD
AWS IAM
AWS IAM Identities
What is defense in depth? | Layered security - Cloudflare
Infographic: Defense-in-Depth - colohouse.com
ITSP.50.104 Guidance on defence in depth for cloud-based services - cyber.gc.ca
Public Cloud Security Breaches
The 2022 Top 7 Cloud Attack Paths - Lightspin
Top 10 Cloud Attacks and What You Can Do About Them - aquasec.com
Credentials stuffing
HackTricks Cloud
Principle of Least Privilege (POLP)
AWS VPC Network Application Protection
Azure Network Security
Azure Confidential Computing
Amazon GuardDuty
AWS Artifact
AWS Compliance Center
Azure Compliance Manager
Microsoft Trust Center
GCP Security Command Center
GCP Compliance Resource Center
HIPAA Reference Architecture on AWS