Expanded

File Analysis with TruffleHog

In this course, you will learn to perform file analysis of source code repositories using the tool TruffleHog, which is one of the essential steps of continuous data loss detection and prevention
Course info
Level
Intermediate
Updated
Apr 15, 2021
Duration
23m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 15, 2021
Duration
23m
Description

In this course, File Analysis with TruffleHog you will cover how to utilize TruffleHog to identify and detect sensitive data such as credentials accidentally committed to source code repository environments. You will discover how to audit your source environments including recent and historic source code commits. You will learn how to place decoy credentials in source code repositories and analyze your repositories for exposed credentials. When you are finished with this course, you will have the skills and knowledge to aid in mitigating technique T1552 using TruffleHog.

About the author
About the author

Tim Coakley is a Senior Security Solutions Architect for a large multi-national organisation and an author at PluralSight. Tim started a long and successful full-time career in Digital Forensics supporting the criminal justice system and law enforcement on a long list of criminal cases.

More from the author
Cloud Infrastructure Analysis with Prowler
Intermediate
24m
Mar 11, 2021
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and its Blue Team Tools course, featuring TruffleHog, the open‑source file analysis tool developed and maintained by Truffle Security. Ensuring your organization has complete control over all credentials and secrets is an important part of maintaining a secure organization. Here, we want to reduce the time between any credential loss occurring and your organization detecting and remediating them. If you avoid this activity, then you may be impacted by serious incidents and become the next cybersecurity statistic. In this course, you will learn how to use TruffleHog to identify and detect credentials and secrets stored within source-code repositories. We'll cover specifically GitHub, a source‑code repository vendor used within many enterprises today. You will learn how to audit your source‑code repositories to help protect your environments to reduce security risk. Finally, you'll learn about decoy credentials as an active defense technique to help identify threat actors specifically targeting your organization. TruffleHog has been available for many years, yet many organizations fail to maintain control of credential leakage. This course is aimed at all security professionals, whether it be for general awareness or how to implement and use the tooling. Whatever the background, you'll find this course useful. I would also recommend this course to users traditionally outside of security teams, such as developers and product managers, as there is useful information here in the growing area of DevSecOps. The open‑source version of TruffleHog is free, free to use at no cost. Please join me in learning TruffleHog and start to learn how to secure your credentials and source‑code repositories today.