What You Need to Know Before
You Start

Starts 5 July 2025 03:48

Ends 5 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Fight Stealth with Stealth: Detecting Post-Breach Activity in the Cloud

Join us to explore innovative ways in which deception techniques can bolster your cloud security. In this session, we delve into implementing stealthy tripwires through the use of canaries and honey resources designed to unearth post-breach lateral movement and thwart privilege escalation. Elevate your cloud defenses by understanding how to.
BSidesCharm via YouTube

BSidesCharm

2777 Courses


56 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Video

Optional upgrade avallable

Overview

Join us to explore innovative ways in which deception techniques can bolster your cloud security. In this session, we delve into implementing stealthy tripwires through the use of canaries and honey resources designed to unearth post-breach lateral movement and thwart privilege escalation.

Elevate your cloud defenses by understanding how to use these subtle yet effective strategies to stay ahead of malicious actors.

Whether you're venturing into the realm of Artificial Intelligence, programming, or cybersecurity, this course equips you with the knowledge to reinforce your cloud environments against sophisticated threats. Harness the power of stealth to defend against stealth.

Syllabus

  • Introduction to Post-Breach Detection
  • Overview of Post-Breach Activity
    Importance of Detection in Cloud Environments
  • Introduction to Deception Techniques
  • Understanding Deception in Cybersecurity
    Types of Deception Techniques: Canaries, Honeypots, Honey Tokens
  • Implementing Canaries in Cloud Environments
  • Designing Effective Canaries
    Deployment Strategies for Canaries
    Monitoring and Alerting Systems
  • Honey Resources: An Advanced Layer of Deception
  • Designing Honey Resources to Mimic Legitimate Data
    Integration of Honey Resources in Cloud Architectures
    Case Studies and Examples
  • Detecting Lateral Movement Post-Breach
  • Common Patterns and Indicators of Lateral Movement
    Leveraging Deception Techniques for Real-Time Detection
    Best Practices in Alert Configuration
  • Combating Privilege Escalation with Stealth
  • Identifying Escalation Techniques
    Deploying Stealth Tripwires for Quick Detection
    Response Strategies upon Detection
  • Tools and Technologies
  • Overview of Modern Tools for Deception and Detection
    Implementing Open Source and Proprietary Solutions
    Evaluating Tools for Your Cloud Environment
  • Real-world Applications and Case Studies
  • Analysis of Real-world Breaches and Deception Success
    Industry Best Practices and Lessons Learned
  • Building Your Detection Playbook
  • Creating a Detection Strategy
    Customizing Playbooks for Different Cloud Environments
    Regular Testing and Updates
  • Course Review and Final Assessment
  • Reviewing Key Concepts
    Practical Assessment Projects
    Future Trends in Cloud Detection and Deception

Subjects

Programming