The AWS and Google Cloud network access for this training
Here's a diagram that shows how the entire network is laid out. Basically so far and when we run our setup commands during these 3 days,
Each one of you has your own virtual machine
Each one of you has your own attacker machine running inside your AWS
For most of the exercises, each one of you will have target infrastructure running within your own accounts.
For some exercises, you will be attacking infrastructure hosted by Appsecco to mimic Internet based attacks
We will mention access to various targets if access is different than what is mentioned above

Last updated