Enterprise Ethical Hacking Cloud Applications


6th August 2020
Speaker Date: 5th August 2020
Speaker Time: EDT: 22:00-23:00
Attendee Date: 6th August 2020
Attendee Time: IST: 07:30-08:30 | SGT: 10:00-11:00 | AEST: 12:00-13:00
Duration: 50 mins
Rohit Bhardwaj
Senior Architect, Cloud-native Expert in cloud-native solutions

Securing of the web application is an enormous task. In this talk, we will explore how to protect enterprise applications. We will explore different kinds of vulnerabilities and hot to secure your applications properly. Security patterns need to be understood by first wearing the hat of a hacker and then putting the hat as a defender. In this session, we will explore different security patterns and determine how to prevent attacks.

We will be using Kali Linux to understand Ethical hacking techniques using Metasploitable applications. In the end, we will see how OpenVas can help in scanning the vulnerabilities in the application.

In this session, you will learn:

  • Threat Modeling techniques using the Threat modeling tool
  • Reconnaissance to gather information, Google hacking database, Exploit Database
  • Scanning for vulnerabilities using Burp Proxy, FoxyProxy, SSL Scan, OWASP ZAP
  • Exploitation with DOS attacks
  • Risk Analysis

You may also be interested in

3rd, September

Time
What a Character

We will cover the concepts of representing scripts from different languages, and an introduction to Unicode. We will delve into...

3rd, September

Time
Local Variable Type Inference: Friend or Foe?

Local variable type inference was introduced as a new Java language feature in Java SE 10. Gone are the days...

3rd, September

Time
Hands-on Cloud-native Java with MicroProfile, Kubernetes and Istio

Ever wondered what makes a cloud-native application “cloud-native”? Ever wondered what the unique challenges are and how best to address...

3rd, September

Time
Rabbit MQ vs Kafka: When, Which, Where?

Rabbit MQ and Kafka are both considered to be the Go-To frameworks for data transmission (messaging). Many developers place them...

3rd, September

Time
Exploring Collectors: One of the Most Powerful Utility Class in the JDK

One of the most intriguing classes in the JDK is the Collectors utility class, with a collection of some highly...

3rd, September

Time
Agile Engineering: The Hard Parts

While teams can pick up the easy parts of agile from books and conferences, some of the engineering practices still...