Cloud Security Threat Detection
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 19m | 179 MB
Instructor: Alexander Shafe
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 19m | 179 MB
Instructor: Alexander Shafe
Detect threats in cloud environments using cloud-native logs, detection rules, and testing tools. This course will teach you how to build, deploy, and validate effective cloud threat detection pipelines.
What you'll learn
Cloud environments bring agility, but also unique security challenges. In this course, Cloud Security Threat Detection, you’ll learn how to build and validate detection strategies tailored for cloud-native environments.
First, you’ll explore how to configure and analyze critical log sources such as CloudTrail, VPC Flow Logs, and IAM events. Next, you’ll discover how to write and deploy detection rules for threats like API abuse, privilege escalation, and lateral movement using SIEM tools like Splunk and Elastic. Finally, you’ll learn how to test and fine-tune these detections using tools like Atomic Red Team and Stratus Red Team.
By the end of this course, you’ll have the hands-on skills and foundational knowledge needed to proactively detect threats across your cloud infrastructure.