1: Learn about the most recent public cloud-based threat vectors.
2: Discover the most effective tactics and tools for discovering threats across cloud platforms.
3: Learn why IDS can no longer be relied upon as the primary tool for threat hunting.
Command-line experience. Threat research or incident response. Open source tools such as GitRob, Cloud Custodian, etc.