Abstract

Modern cloud infrastructure is complex. It can comprise a wide range of connected hosts, containers, managed cloud services, and of course cloud resources like blob storage, users and roles, and the cloud control plane. To effectively secure cloud infrastructure, it’s critical to correlate information from a variety of sources, including information about the state of resources coupled with detection of suspicious and anomalous activity within those resources.

In this workshop you will learn by acting as both attacker and defender. You will attack your infrastructure using the latest popular attack vectors for cloud environments, and you will detect and respond to your attack using Datadog CSPM and CWS to capture the entire attacker lifecycle.

Technical Requirements

In order to complete the course, you will need:

  • Google Chrome or Firefox
  • Third-party cookies must be enabled to access labs

Course Navigation

At the bottom of each lesson, click MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this workshop ends after 10 days.

Workshop Curriculum

    1. Lab: Securing Cloud-Native Infrastructure

    2. Feedback

    3. Additional Resources

[Deprecated] Securing Cloud-Native Infrastructure: A Journey Through the Attacker Lifecycle

  • 1.5-3 hours to complete
  • 1 Lesson
  • 0 hours of video content
  • Intermediate