What You Need to Know Before
You Start
Starts 5 July 2025 03:48
Ends 5 July 2025
Fight Stealth with Stealth: Detecting Post-Breach Activity in the Cloud
BSidesCharm
2777 Courses
56 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Video
Optional upgrade avallable
Overview
Join us to explore innovative ways in which deception techniques can bolster your cloud security. In this session, we delve into implementing stealthy tripwires through the use of canaries and honey resources designed to unearth post-breach lateral movement and thwart privilege escalation.
Elevate your cloud defenses by understanding how to use these subtle yet effective strategies to stay ahead of malicious actors.
Whether you're venturing into the realm of Artificial Intelligence, programming, or cybersecurity, this course equips you with the knowledge to reinforce your cloud environments against sophisticated threats. Harness the power of stealth to defend against stealth.
Syllabus
- Introduction to Post-Breach Detection
- Introduction to Deception Techniques
- Implementing Canaries in Cloud Environments
- Honey Resources: An Advanced Layer of Deception
- Detecting Lateral Movement Post-Breach
- Combating Privilege Escalation with Stealth
- Tools and Technologies
- Real-world Applications and Case Studies
- Building Your Detection Playbook
- Course Review and Final Assessment
Subjects
Programming