Posted on
in Presentations
Gain firsthand experience identifying attacks against Azure workloads. You will be a member of the Contoso blue team tasked with investigating and resolving attacks that are commonly seen within cloud environments. You will also leverage the details learned about the attacks to implement the appropriate countermeasures and harden the environment to ensure that future attacks don’t occur.
Learning Objectives:
1: Gain an understanding of common attacks against cloud workloads.
2: Learn how to leverage built-in cloud services to detect, investigate and contain attacks.
3: Understand how to harden cloud environments to be resilient to common attacks.
Pre-Requisites:
Participants need to understand common hacker tools and techniques and know how to identify artifacts related to such attacks. Participants should also have general knowledge of basic security logging and monitoring and have the ability to write queries leveraging common scripting languages.
Learning Objectives:
1: Gain an understanding of common attacks against cloud workloads.
2: Learn how to leverage built-in cloud services to detect, investigate and contain attacks.
3: Understand how to harden cloud environments to be resilient to common attacks.
Pre-Requisites:
Participants need to understand common hacker tools and techniques and know how to identify artifacts related to such attacks. Participants should also have general knowledge of basic security logging and monitoring and have the ability to write queries leveraging common scripting languages.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community