SANS AUD507.4 Auditing Private and Public Clouds, Containers, and Networks

فهرست مطالب کتاب SANS AUD507.4 Auditing Private and Public Clouds, Containers, and Networks:

Introduction to Cloud Technologies

Private Clouds and Hypervisors

Exercise 4.1: Auditing Hypervisors

The Public Cloud

Containers

Exercise 4.2: Auditing Docker Security

Networks and Firewalls

Exercise 4.3: Wireshark, Switch Configuration Symptoms and Device Configuration Auditing

Wi-Fi and VPNs

Public Services

Exercise 4.4: Auditing Public Services

SANS AUD507.5 Auditing Web Applications

فهرست مطالب کتاب SANS AUD507.5 Auditing Web Applications:

Understanding Web Applications

Exercise 5.1: HTML, HTTP, and Burp

Server Configuration

Secure Development Practices

Exercise 5.2: Analyzing TLS and Robots.txt

Authentication and Access Control

Exercise 5.3: Fuzzing and Brute Forcing with Burp Intruder

Data Handling

Logging and Monitoring

Exercise 5.4: Finding Injection Flaws

SANS FOR509.1 Microsoft 365 and Graph API

فهرست مطالب کتاب Microsoft 365 and Graph API:

Section 1.1: Introducing SOF-ELK®

Section 1.2: Key Elements of Cloud for DFIR

Section 1.3: Microsoft 365 Unified Audit Log

Section 1.4: Microsoft Graph API

SANS FOR509.2 Microsoft Azure

فهرست مطالب کتاب Microsoft Azure:

Section 2.1: Understanding Azure

Section 2.2: VMs, Networking, and Storage

Section 2.3: Log Sources for IR

Section 2.4: Virtual Machine Logs

Section 2.5: In-Cloud IR

SANS FOR509.3 Amazon Web Services (AWS)

فهرست مطالب کتاب Amazon Web Services (AWS): 

Section 3.1: Understanding IR in AWS

Section 3.2: Networking, VMs, and Storage

Section 3.3: AWS Native Log Searching

Section 3.4: Event-Driven Response

Section 3.5: In-Cloud IR

SANS FOR509.5 Google Cloud

فهرست مطالب کتاب Google Cloud:

Section 5.1: Understanding Google Cloud

Section 5.2: Log Sources, Collection, & Log Routing

Section 5.3: VM & Storage Investigations

Section 5.4: Google Cloud Network Forensics

Section 5.5: Kubernetes Forensics and IR