Completed
Context Based Monitoring
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Fog of Cloud Security Logging
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Public Cloud Security Threats
- 3 Opportunities To Detect Attacks, Data Exfiltration
- 4 Clear The Log Fog
- 5 Public Cloud Security Program
- 6 Approach
- 7 Cloud Logs by Cloud Services
- 8 Monitor Critical Events & Activities
- 9 Context Based Monitoring
- 10 Log Types, Critical Events & Attributes
- 11 Cloud Security Insights Matter
- 12 Multi-Cloud Logging Architecture - On-Premises SIEM
- 13 Multi-Cloud Logging Architecture - CSP Cloud SIEMS
- 14 Critical Attributes For Log Monitoring
- 15 AWS Network Log
- 16 Use-case: System visibility for Compute
- 17 Use-case: AWS Audit Logging
- 18 Use-case: Network visibility for Security Events
- 19 Azure Active Directory Logs
- 20 Use-case: Automated Agent Deployment
- 21 Use-case: Network & Resource visibility for Security Events
- 22 Take Away Checklist