Threat Hunting in the Cloud

Threat Hunting in the Cloud

NorthSec via YouTube Direct link

Intro

1 of 16

1 of 16

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Threat Hunting in the Cloud

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is a cloud service provider?
  3. 3 Shared responsibility model (IaaS)
  4. 4 Cloud service provider adoption aws
  5. 5 Infosec community on cloud services How well do traditional network Security tools work in cloud environments?
  6. 6 What are they after? It depends on the type of attacker
  7. 7 Attacks in the field
  8. 8 Enterprise architecture example
  9. 9 AWS architecture example
  10. 10 CSP Attacker Tools
  11. 11 Catching direct attacks against the CSP
  12. 12 Endpoint considerations
  13. 13 Endpoint visibility - forensics data
  14. 14 Endpoint visibility - PowerShell visibility
  15. 15 Executing code - Azure API | Endpoint execution
  16. 16 Executing code - AWS API | Endpoint execution

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.