Skip to main content

Home Specialist skills Security SEC541: Cloud Security Attacker Techniques, Monitoring and Threat Detection

SEC541: Cloud Security Attacker Techniques, Monitoring and Threat Detection

  • bullet point
    Learn how to automate analytics
  • bullet point
    Help your organisation properly set up logging and configuration
  • bullet point
    Learn how to decrease risk of costly attacks by understanding and leveraging cloud specific security services
  • bullet point
    Learn to lessen the impact of breaches that do happen

Overview

Off the shelf (OTS)

Cloud infrastructure provides organisations with new and exciting services to better meet the demands of their customers. However, these services bring with them new challenges, particularly for organisations struggling to make sense of the cloud native logs, keeping ahead of fast-moving development teams, and trying to learn how threats are adapting to cloud services. Securely operating cloud infrastructure requires new tools and approaches for better visibility into the cloud environment threat landscape, ability to capture appropriate data, and most importantly to be able to analyse and correlate the data effectively and accurately to understand if the specific threat is legitimate based on your organisation's bigger picture.

Delivery method
Face to face icon

Face to face

Virtual icon

Virtual

Digital icon

Digital

Course duration
Duration icon

40 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • face to face icon

    Face to face

  • Virtual icon

    Virtual

  • Digital icon

    Digital

Course duration
Duration icon

40 hours

Competency level
  • Working icon

    Working

chatbotSpark login – Alpha testing