Hands-on Threat Hunting in AWS Environment

Discover essential skills and strategies for effective threat hunting within the AWS environment.

What You Will Learn:

Understand the importance of threat hunting in cloud environments and explore the benefits of proactive threat detection and response.

Learn about CloudTrail and CloudWatch Logs Analysis

Master the analysis of CloudTrail and CloudWatch logs for identifying suspicious activities.

Explore techniques for identifying anomalies and deviations from baseline behavior.

Learn to analyze VPC Flow Logs and network traffic patterns.

Investigate identity and access management events for signs of privilege escalation.

Learn to analyze malware artifacts and suspicious files within AWS.

Develop skills for effective incident response and containment in AWS.

Learn how to automate repetitive threat hunting tasks using AWS services.

Payment Information

Contact

Billing Address

Payment Methods

PayPal selected.

After submitting, you will be redirected to the PayPal website to fill out your payment information. You will be redirected back to our site once the payment is completed.

Apple Pay selected.

Another step will appear to securely submit your payment information.

Google Pay selected.

Another step will appear to securely submit your payment information.

Order Summary

Subtotal:
[[checkoutContext.order.invoice.subtotal | currency]]
Tax:
[[checkoutContext.order.invoice.tax | currency]]
Shipping:
[[checkoutContext.order.invoice.shipping | currency]]
Discounts:
-[[checkoutContext.order.invoice.discount | currency]]
Total:
[[checkoutContext.order.invoice.total | currency]]
[[subscriptionsByProductId[checkoutContext.order.invoice.items[0].product_id].plan_description]]