Course Overview

In the ever-evolving realm of cybersecurity threats, organizations need to stay ahead, especially within their Amazon Web Services (AWS) environments. Enter the "Threat Hunting on AWS" course, a comprehensive program tailored for cybersecurity professionals. This course is designed to arm participants with both knowledge and practical skills, empowering them to proactively seek and neutralize potential security risks within AWS.  

Throughout the program, participants will engage in hands-on experiences with various tools and techniques, ultimately enhancing the security posture of their AWS infrastructure. With a focus on real-world examples and interactive exercises, this course equips you with the essential skills needed to navigate the complex landscape of cybersecurity threats within AWS. 

By the end of the course, participants will be equipped with the knowledge and skills to proactively hunt for threats, analyze potential risks, and respond effectively to security incidents within AWS environments. They will have hands-on experience with various tools and techniques to enhance the overall security posture of their AWS infrastructure.   

What You Will Learn

  • Understand the importance of threat hunting in cloud environments and explore the benefits of proactive threat detection and response.
  • Learn about CloudTrail and CloudWatch Logs Analysis.
  • Master the analysis of CloudTrail and CloudWatch logs for identifying suspicious activities.
  • Explore techniques for identifying anomalies and deviations from baseline behavior.
  • Learn to analyze VPC Flow Logs and network traffic patterns.
  • Investigate identity and access management events for signs of privilege escalation.
  • Learn to analyze malware artifacts and suspicious files within AWS.
  • Develop skills for effective incident response and containment in AWS.
  • Learn how to automate repetitive threat hunting tasks using AWS services.

Program Curriculum

  • Introduction
  • Pyramid of Pain
  • Tools
  • Threat Hunting Maturity Model
  • Threat Hunting Process
  • Importance of Threat Hunting
  • Threat Hunting, Threat Detection & Threat Intelligence
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Threat Hunting in Cloud Environment
  • AWS Shared Responsibility Model
  • Understanding the AWS Threat Landscape
  • AWS Security Services Overview
  • Data Sources for Threat Hunting
  • Logging and Monitoring in AWS
  • Collecting and Storing Logs
  • Chapter 2 Quiz

  • Preparation
  • Response and Mitigation
  • Documentation and Improvement

  • Threat Intelligence
  • Sources of Threat Intelligence
  • Importance of Context in Threat Hunting
  • Chapter 4 Quiz

  • MITTRE ATT&CK
  • Hypothesis
  • Plan & Hunt
  • Chapter 5 Quiz

  • APT29
  • APT29 Targeting AWS
  • Hunt Methodology
  • APT 29 TTP
  • APT 29 Hunt
  • Chapter 6 Quiz

  • Why and What to Automate?
  • How Automation with AWS Lambda?
  • Automated Response Actions
  • Automating Threat Response using AWS Lambda Functions
  • Remediation Strategies
  • Chapter 7 Quiz
Load more modules

Instructor

Malcolm Xavier

Malcolm Xavier is an IT Security Lead for a leading oil and gas company with a global presence. In this role, he ensures the security and resilience of the company's digital assets and operations, as well as its compliance with industry standards and regulations. He has 18+ years of experience in the digital technology industry, spanning various domains and sectors, such as IT services, banking, insurance, telecom, and energy. His core competencies include IT and Cybersecurity strategy, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management. Additionally, he’s a certified professional in multiple disciplines, such as CISSP, TOGAF, Prince 2, Azure, and Google Cloud, he has a proven track record in leading IT transformation and strategic projects, delivering innovative and cost-effective solutions, and fostering C-level relationships with customers. He is passionate about advancing and protecting the cyber industry with my strategic guidance and expertise. He also takes pride in mentoring and training IT professionals across the globe and making a positive impact in this critical domain.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8