Module 17: Cloud SOC — Defending Beyond the Perimeter

Cloud-native logging, attack patterns, and detection for AWS, Azure, and GCP.

Tools:Wazuh
4
Lessons
4
Hands-on Labs
Operation Shadow Broker Thread

You'll investigate the attacker's cloud pivot — console login from 185.220.101.42, IAM key creation, S3 policy changes.

Lessons & Labs