Cloud Security: Detecting and Mitigating Common Attack Techniques in Azure and AWS
Red Canary via YouTube
Learn Backend Development Part-Time, Online
Google, IBM & Meta Certificates — 40% Off for a Limited Time
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Join a comprehensive webinar that delves into adversarial tactics used to compromise Azure and Amazon Web Services (AWS) cloud systems. Learn from cloud security experts as they construct a hypothetical scenario demonstrating how attackers gain initial access, elevate privileges, maintain persistence, and execute other malicious activities in cloud environments. Gain practical insights into implementing effective observability measures, expanding detection coverage, responding to threats, mitigating risks, and testing security controls. Master key techniques including Cloud Accounts (T1078.004), Additional Cloud Credentials (T1098.001), and Cloud API (T1059.009). Understand the nuances of device code phishing, discover how cloud-based privilege escalation differs from endpoint-based attacks, and explore additional advanced cloud security concepts. Access supplementary resources for enhancing AWS visibility and improving overall cloud security posture through detailed guidance and expert recommendations.
Syllabus
The Detection Series: Prevalent cloud techniques
Taught by
Red Canary