Companies Home Search Profile

Introduction to AWS Threat Detection

Focused View

Day Johnson

1:05:03

169 View
  • 01 - The rise of cloud threats.mp4
    00:37
  • 02 - What you should know.mp4
    00:42
  • 01 - Understanding the MITRE Cloud Matrix.mp4
    01:40
  • 02 - MITRE Cloud Tactics.mp4
    05:07
  • 01 - Why you need cloud audit logs.mp4
    02:58
  • 02 - Understanding cloud planes.mp4
    02:38
  • 03 - CloudTrail basics.mp4
    03:21
  • 04 - How CloudTrail works.mp4
    03:21
  • 05 - CloudTrail demo.mp4
    02:04
  • 06 - Creating your first trail.mp4
    01:46
  • 01 - Introduction to CloudTrail log analysis with jq.mp4
    01:11
  • 02 - jq installation.mp4
    00:42
  • 03 - Unzipping CloudTrail files in bulk.mp4
    02:31
  • 04 - Analyzing AWS identities with jq.mp4
    01:05
  • 05 - Analyzing AWS events with jq.mp4
    01:05
  • 06 - Enumeration in AWS.mp4
    02:47
  • 07 - Analyzing AWS enumeration events with jq.mp4
    02:50
  • 08 - Extracting AWS event details with jq.mp4
    00:49
  • 09 - Introduction to CloudTrail log analysis with CloudTrail Lake.mp4
    01:37
  • 10 - Getting started with AWS CloudTrail Lake.mp4
    01:23
  • 11 - Challenge Analyze CloudTrail Logs with jq.mp4
    00:41
  • 12 - Solution Analyze CloudTrail Logs with jq.mp4
    02:29
  • 01 - Analyzing enumeration attacks from EC2 instances.mp4
    02:44
  • 02 - Amazon EC2 AMI exfiltration.mp4
    01:54
  • 03 - Amazon EBS snapshot exfiltration.mp4
    01:39
  • 01 - AWS access key leakage.mp4
    01:16
  • 02 - Malicious IAM user creation.mp4
    01:32
  • 03 - Malicious access key creation.mp4
    01:29
  • 04 - Malicious login profile creation.mp4
    01:06
  • 05 - Malicious login profile update.mp4
    01:00
  • 06 - Malicious privileged role assignment.mp4
    00:41
  • 01 - S3 bucket enumeration.mp4
    01:25
  • 02 - S3 bucket versioning modification.mp4
    01:09
  • 03 - S3 bucket policy modification.mp4
    00:51
  • 04 - S3 object exfiltration.mp4
    00:42
  • 05 - S3 object deletion.mp4
    00:49
  • 01 - CloudTrail logging stopped.mp4
    01:04
  • 02 - CloudTrail trail deletion.mp4
    00:47
  • 01 - Detecting AWS threats with GuardDuty.mp4
    00:35
  • 01 - Learning more about AWS security.mp4
    00:56
  • Description


    If you work in an AWS cloud environment, you can’t overlook the importance of security. Join instructor Day Johnson in this beginner-friendly course for an overview of how cloud security analysts, cloud security engineers, and cloud incident responders can use AWS to investigate and analyze potentially compromising security threats.

    Explore foundational skills and tactics for auditing activities with MITRE Cloud Matrix and CloudTrail as well as how to investigate compute threats, IAM threats, and storage threats. By the end of this course, you’ll also have the skills required to start detecting threats with Amazon GuardDuty, the threat detection service built into AWS. This course also caters to entry-level security or cloud professionals looking to learn the basics of AWS cloud threat analysis.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 40
    • duration 1:05:03
    • Release Date 2023/09/06