Cloud Defender: Detecting and Responding to Adversaries in AWS


Posted on in Presentations

Get first-hand experience with cloud penetration techniques, see what they look like and learn how to defend against them. You will use the provided template to spin up an example AWS environment in your account, hack it using scripts and watch the attack unfold in real time. Use evidence from the attack to create automated countermeasures. Leverage built-in AWS services to detect signs of compromise.

Learning Objectives:
1: Experience examples of real-world advanced public cloud hacking.
2: Learn ways to detect public cloud hacking by combining weak signals.
3: Get templates to create a hack lab in your own cloud and see for yourself.

Hackers & Threats

big data analytics cloud security hackers & threats security analytics behavioral analytics


Topic

Subtopic


Share With Your Community