Course Summary
This course focused on cloud threat detection, security monitoring, and security analysis. This course delves into attacker techniques, providing you with a comprehensive understanding of how adversaries operate in cloud environments. You will explore the functionality of cloud logging and security tools, mastering their use to detect and respond to potential threats effectively. Additionally, the course covers detection engineering in cloud environments, equipping you with the expertise to design and implement robust threat detection systems. By the course’s conclusion, you’ll possess the skills to analyze cloud-based attacks and establish a strong security engineering program.
Key Focus Areas:
Detecting and responding to attacks in the cloud
Conducting cloud investigations and leveraging cyber threat intelligence
Performing assessments and automating defenses in AWS and Azure
Automation
Candidates will demonstrate an understanding of cloud automation options and the ability to design a simple automated response workflow.
Cloud Management
Candidates will showcase knowledge of cloud-specific security concerns, including cloud access, monitoring, and data collection sources.
Containers and Cloud Proxies
Candidates will exhibit an understanding of containers and cloud proxy services, including common threats and associated log sources.
Cyber Threat Intelligence and Threat Hunting
Candidates will demonstrate knowledge of cyber threat intelligence types and sources, along with their practical applications in threat hunting.
Data and Vulnerability Management
Candidates will perform basic vulnerability assessments and demonstrate the ability to conduct data discovery activities.
Host Logging
Candidates will demonstrate hands-on skills in configuring and accessing host-based logs within Microsoft and Amazon cloud environments.
Inventory and Configuration Tools
Candidates will showcase the ability to perform inventory discovery and demonstrate knowledge of cloud configuration tools.
Monitoring, Detection, and Analysis
Candidates will display an understanding of monitoring and detection tools and conduct basic log investigations using cloud-based tools.
Network Logging
Candidates will demonstrate practical skills in configuring and accessing network logs in Microsoft and Amazon cloud environments.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT