[Deprecated] Securing Cloud-Native Infrastructure: A Journey Through the Attacker Lifecycle
Do not use this workshop! Reach out to the Customer Education and Training team to get the correct version of the workshop.
Modern cloud infrastructure is complex. It can comprise a wide range of connected hosts, containers, managed cloud services, and of course cloud resources like blob storage, users and roles, and the cloud control plane. To effectively secure cloud infrastructure, it’s critical to correlate information from a variety of sources, including information about the state of resources coupled with detection of suspicious and anomalous activity within those resources.
In this workshop you will learn by acting as both attacker and defender. You will attack your infrastructure using the latest popular attack vectors for cloud environments, and you will detect and respond to your attack using Datadog CSPM and CWS to capture the entire attacker lifecycle.
In order to complete the course, you will need:
Please note that your enrollment in this workshop ends after 10 days.
Lab: Securing Cloud-Native Infrastructure
Feedback
Additional Resources