Cloud Threat Hunting
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Missed Opportunities
Roadmap
Finger Pointing
Lack of Visibility
Our Cloud Threat Simulation
AWS Cloud Hacking Toolkit
Microsoft Cloud Environment
Meet The Cloud Hacker
Instrumentation
An Anonymous Threat
Threat Hunting - Create Hypothesis
AWS Tools
Guard Duty - "Hacker" Operating System Alert
Alert Fatigue
Interview with Anna Demin
Hunting With Splunk
Getting Data Into Splunk
Alert! The Adversary Lists Buckets
Alert! The Adversary Checks Available Functions
The User Agent String: A Wealth of Information
Chained with...
The Meatballs Are Gone!
New Host Configuration
Microsoft Audit Log Search
Can You Trust Your Tools?
Use Powershell Instead of the GUI for Better Results
Splunk Joins The Hunt!
Adversary - Successful Login
Adversary Geolocation
Create Hypothesis - Credential Stuffing
Mirroring Network Traffic-VTAP
Hosted Network Monitoring - Extra Hop
Current Hypothesis
Takeaways
Questions?
Taught by
RSA Conference
Related Courses
Introduction to Artificial IntelligenceStanford University via Udacity Probabilistic Graphical Models 1: Representation
Stanford University via Coursera Artificial Intelligence for Robotics
Stanford University via Udacity Computer Vision: The Fundamentals
University of California, Berkeley via Coursera Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent