Completed
What are they after? It depends on the type of attacker
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Hunting in the Cloud
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is a cloud service provider?
- 3 Shared responsibility model (IaaS)
- 4 Cloud service provider adoption aws
- 5 Infosec community on cloud services How well do traditional network Security tools work in cloud environments?
- 6 What are they after? It depends on the type of attacker
- 7 Attacks in the field
- 8 Enterprise architecture example
- 9 AWS architecture example
- 10 CSP Attacker Tools
- 11 Catching direct attacks against the CSP
- 12 Endpoint considerations
- 13 Endpoint visibility - forensics data
- 14 Endpoint visibility - PowerShell visibility
- 15 Executing code - Azure API | Endpoint execution
- 16 Executing code - AWS API | Endpoint execution