Key Features
- Understand the different Azure attack techniques and methodologies used by hackers
- Find out how you can ensure end-to-end cybersecurity in the Azure ecosystem
- Discover various tools and techniques to perform successful penetration tests on your Azure infrastructure
Who this book is for
This book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOps engineers) interested in learning how attackers exploit vulnerabilities in Azure hosted infrastructure, applications, and services will find this book useful.