What You Need to Know Before
You Start
Starts 8 June 2025 09:08
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
Fight Stealth with Stealth: Detecting Post-Breach Activity in the Cloud
Discover how to implement stealthy tripwires using deception techniques like canaries and honey resources to detect post-breach lateral movement and privilege escalation in cloud environments.
BSidesCharm
via YouTube
BSidesCharm
2544 Courses
56 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Video
Optional upgrade avallable
Overview
Discover how to implement stealthy tripwires using deception techniques like canaries and honey resources to detect post-breach lateral movement and privilege escalation in cloud environments.
Syllabus
- Introduction to Post-Breach Detection
- Introduction to Deception Techniques
- Implementing Canaries in Cloud Environments
- Honey Resources: An Advanced Layer of Deception
- Detecting Lateral Movement Post-Breach
- Combating Privilege Escalation with Stealth
- Tools and Technologies
- Real-world Applications and Case Studies
- Building Your Detection Playbook
- Course Review and Final Assessment
Overview of Post-Breach Activity
Importance of Detection in Cloud Environments
Understanding Deception in Cybersecurity
Types of Deception Techniques: Canaries, Honeypots, Honey Tokens
Designing Effective Canaries
Deployment Strategies for Canaries
Monitoring and Alerting Systems
Designing Honey Resources to Mimic Legitimate Data
Integration of Honey Resources in Cloud Architectures
Case Studies and Examples
Common Patterns and Indicators of Lateral Movement
Leveraging Deception Techniques for Real-Time Detection
Best Practices in Alert Configuration
Identifying Escalation Techniques
Deploying Stealth Tripwires for Quick Detection
Response Strategies upon Detection
Overview of Modern Tools for Deception and Detection
Implementing Open Source and Proprietary Solutions
Evaluating Tools for Your Cloud Environment
Analysis of Real-world Breaches and Deception Success
Industry Best Practices and Lessons Learned
Creating a Detection Strategy
Customizing Playbooks for Different Cloud Environments
Regular Testing and Updates
Reviewing Key Concepts
Practical Assessment Projects
Future Trends in Cloud Detection and Deception
Subjects
Programming