Cloud Infrastructure Analysis with Prowler

In this course, you will learn to perform AWS cloud security assessments using the tool Prowler, which is one of the first essential steps to continuous security in the cloud.
Course info
Level
Intermediate
Updated
Mar 11, 2021
Duration
24m
Table of contents
Description
Course info
Level
Intermediate
Updated
Mar 11, 2021
Duration
24m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

Ensuring your cloud environments are securely configured is an important element in developing a continuous cloud security program. In this course, Cloud Infrastructure Analysis with Prowler, you will see how to utilize Prowler to identify and detect security misconfigurations in the cloud in an enterprise environment. You will learn how to audit your cloud security accounts protecting your cloud environment. You will also get to see how to build a decoy network and how to analyze your cloud configurations for exposed services. When you are finished with this course, you will have the skills and knowledge to aid in mitigating technique T1526 using Prowler.

About the author
About the author

Tim Coakley is a Senior Security Solutions Architect for a large multi-national organisation and an author at PluralSight. Tim started a long and successful full-time career in Digital Forensics supporting the criminal justice system and law enforcement on a long list of criminal cases.

More from the author
Analyze Endpoint Data with Elasticsearch
Intermediate
1h 31m
Sep 24, 2021
OS Analysis with Volatility
Intermediate
27m
Jun 25, 2021
File Analysis with TruffleHog
Intermediate
23m
Apr 15, 2021
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and this Blue Team Tools course featuring Prowler, the open source cloud security assessment tool developed and maintained by Toni de la Fuente. Ensuring your cloud environments are securely configured is an important element in developing a continuous cloud security program. Here, we want to minimize the time between a cloud security misconfiguration occurring and your organization detecting and remediating them. This is critical to the success of your organization to avoid becoming the next news headline. In this course, you will learn how to use Prowler to identify and detect security misconfigurations in the cloud, specifically AWS, a cloud service provider used by many enterprises. You will learn how to audit your cloud accounts, protecting your environment. Finally, you will build a decoy network and analyze your cloud configurations for export services. So why Prowler? Prowler has been in development for over five years and is now a mature tool with lots of capabilities. Secondly, and equally appealing, this solution is free. It's free to use and is open source. It performs over 100 different checks against your cloud infrastructure and caters for different organizations and their varying requirements. Please join me in learning Prowler and start to learn how to secure your cloud environments today.