YoVDO

Beyond the Perimeter - Uncovering Hidden Data Exfiltration Threats in Google Cloud Platform

Offered By: BSidesLV via YouTube

Tags

Cybersecurity Courses BigQuery Courses Cloud SQL Courses Access Control Courses Cloud Security Courses Threat Detection Courses Google Cloud Storage Courses Data Exfiltration Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore five methods attackers use to steal data from Google Cloud Platform (GCP) resources with minimal detection risk. Delve into the intricacies of data exfiltration techniques targeting popular services like Google Cloud Storage, Cloud SQL, and BigQuery. Watch short demonstrations for each method and learn to identify generated log events that indicate malicious behavior. Gain insights into proactive security measures, including enabling audit logs for data activity and implementing robust access controls. Enhance your ability to protect GCP resources and respond swiftly to potential security incidents by leveraging audit log analysis for detecting suspicious activities and potential breaches. This 31-minute conference talk, presented by Or Aspir at BSidesLV, equips security professionals with essential knowledge to safeguard against hidden threats in cloud environments.

Syllabus

BG - Beyond the Perimeter Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network