The Fog of Cloud Security Logging
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Public Cloud Security Threats
Opportunities To Detect Attacks, Data Exfiltration
Clear The Log Fog
Public Cloud Security Program
Approach
Cloud Logs by Cloud Services
Monitor Critical Events & Activities
Context Based Monitoring
Log Types, Critical Events & Attributes
Cloud Security Insights Matter
Multi-Cloud Logging Architecture - On-Premises SIEM
Multi-Cloud Logging Architecture - CSP Cloud SIEMS
Critical Attributes For Log Monitoring
AWS Network Log
Use-case: System visibility for Compute
Use-case: AWS Audit Logging
Use-case: Network visibility for Security Events
Azure Active Directory Logs
Use-case: Automated Agent Deployment
Use-case: Network & Resource visibility for Security Events
Take Away Checklist
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube