CTF (Capture the Flag) challenges are often used in cybersecurity education.
These challenges are available in many different disciplines (e.g. crypto, web, forensics).
Is anybody aware of challenges that mimic typical cloud and/or devops and/or container vulnerabilities?
For example, mimicking the Capital One hack? Or misconfiguration vulnerabilities?
I'd like to use some in the college teaching that I do.
All pointers welcome.
------------------------------
Peter HJ van Eijk
CCSK & CCAK trainer
https://www.clubcloudcomputing.com/------------------------------