Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the analytical mindset and technical workflows of AWS threat hunters in this comprehensive webinar that delves into the cognitive processes behind transforming cloud logs into compelling narratives of adversary behavior. Journey through the vast ocean of cloud security logs alongside experienced threat hunters as they demonstrate their intuitive leaps and systematic approaches to identifying malicious activities. Learn how security professionals navigate through seemingly benign log entries to uncover hidden threats and piece together the story of potential security incidents. Discover the technical workflows, analytical frameworks, and mental models that enable threat hunters to effectively process and interpret large volumes of AWS cloud logs. Gain insights into the decision-making processes, pattern recognition techniques, and investigative methodologies that distinguish expert threat hunters from novice analysts. Understand how to develop the critical thinking skills necessary for effective threat hunting in cloud environments, including how to correlate disparate log sources, identify anomalous behaviors, and construct coherent attack timelines from fragmented data points.
Syllabus
"Among Logs" - Inside the mind of a threat hunter | The Safe Room ft. Security SideQuest!
Taught by
AWS Events