In this course, you will learn to perform AWS cloud security assessments using the tool Prowler, which is one of the first essential steps to continuous security in the cloud.
Ensuring your cloud environments are securely configured is an important element in developing a continuous cloud security program. In this course, Cloud Infrastructure Analysis with Prowler, you will see how to utilize Prowler to identify and detect security misconfigurations in the cloud in an enterprise environment. You will learn how to audit your cloud security accounts protecting your cloud environment. You will also get to see how to build a decoy network and how to analyze your cloud configurations for exposed services. When you are finished with this course, you will have the skills and knowledge to aid in mitigating technique T1526 using Prowler.
Ensuring your cloud environments are securely configured is an important element in developing a continuous cloud security program. In this course, Cloud Infrastructure Analysis with Prowler, you will see how to utilize Prowler to identify and detect security misconfigurations in the cloud in an enterprise environment. You will learn how to audit your cloud security accounts protecting your cloud environment. You will also get to see how to build a decoy network and how to analyze your cloud configurations for exposed services. When you are finished with this course, you will have the skills and knowledge to aid in mitigating technique T1526 using Prowler.