![]() |
Cloud Security Threat Detection
![]() Cloud Security Threat Detection Released 7/2025 By Alexander Shafe MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 1h 19m | Size: 179 MB Detect threats in cloud environments using cloud-native logs, detection rules, and testing tools. This course will teach you how to build, deploy, and validate effective cloud threat detection pipelines. Cloud environments bring agility, but also unique security challenges. In this course, Cloud Security Threat Detection, you'll learn how to build and validate detection strategies tailored for cloud-native environments. First, you'll explore how to configure and analyze critical log sources such as CloudTrail, VPC Flow Logs, and IAM events. Next, you'll discover how to write and deploy detection rules for threats like API abuse, privilege escalation, and lateral movement using SIEM tools like Splunk and Elastic. Finally, you'll learn how to test and fine-tune these detections using tools like Atomic Red Team and Stratus Red Team. By the end of this course, you'll have the hands-on skills and foundational knowledge needed to proactively detect threats across your cloud infrastructure. Homepage Цитата:
|
Часовой пояс GMT +3, время: 22:49. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot