What You Need to Know Before
You Start

Starts 8 June 2025 09:08

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Fight Stealth with Stealth: Detecting Post-Breach Activity in the Cloud

Discover how to implement stealthy tripwires using deception techniques like canaries and honey resources to detect post-breach lateral movement and privilege escalation in cloud environments.
BSidesCharm via YouTube

BSidesCharm

2544 Courses


56 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Video

Optional upgrade avallable

Overview

Discover how to implement stealthy tripwires using deception techniques like canaries and honey resources to detect post-breach lateral movement and privilege escalation in cloud environments.

Syllabus

  • Introduction to Post-Breach Detection
  • Overview of Post-Breach Activity
    Importance of Detection in Cloud Environments
  • Introduction to Deception Techniques
  • Understanding Deception in Cybersecurity
    Types of Deception Techniques: Canaries, Honeypots, Honey Tokens
  • Implementing Canaries in Cloud Environments
  • Designing Effective Canaries
    Deployment Strategies for Canaries
    Monitoring and Alerting Systems
  • Honey Resources: An Advanced Layer of Deception
  • Designing Honey Resources to Mimic Legitimate Data
    Integration of Honey Resources in Cloud Architectures
    Case Studies and Examples
  • Detecting Lateral Movement Post-Breach
  • Common Patterns and Indicators of Lateral Movement
    Leveraging Deception Techniques for Real-Time Detection
    Best Practices in Alert Configuration
  • Combating Privilege Escalation with Stealth
  • Identifying Escalation Techniques
    Deploying Stealth Tripwires for Quick Detection
    Response Strategies upon Detection
  • Tools and Technologies
  • Overview of Modern Tools for Deception and Detection
    Implementing Open Source and Proprietary Solutions
    Evaluating Tools for Your Cloud Environment
  • Real-world Applications and Case Studies
  • Analysis of Real-world Breaches and Deception Success
    Industry Best Practices and Lessons Learned
  • Building Your Detection Playbook
  • Creating a Detection Strategy
    Customizing Playbooks for Different Cloud Environments
    Regular Testing and Updates
  • Course Review and Final Assessment
  • Reviewing Key Concepts
    Practical Assessment Projects
    Future Trends in Cloud Detection and Deception

Subjects

Programming