Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course

Specialized Hunts: Threat Hunting within Cloud Functions and Microservices

Learn how attackers exploit AWS Lambda and microservices. This course shows you how to detect, investigate, and correlate real-world TTPs using CLI techniques and ELK visualizations.

Advanced
53m

Created by Sean Wilkins

Last Updated Jan 29, 2026

Course Thumbnail
  • Course

Specialized Hunts: Threat Hunting within Cloud Functions and Microservices

Learn how attackers exploit AWS Lambda and microservices. This course shows you how to detect, investigate, and correlate real-world TTPs using CLI techniques and ELK visualizations.

Advanced
53m

Created by Sean Wilkins

Last Updated Jan 29, 2026

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Serverless and microservice architectures reduce operational overhead but also introduce new, often misunderstood, attack surfaces. From unauthorized code tampering to privilege escalation and credential harvesting, modern adversaries increasingly target cloud functions as an entry point into enterprise environments. In this course, Specialized Hunts: Threat Hunting within Cloud Functions and Microservices, you’ll learn how to proactively identify and investigate these threats using real-world logs, CLI tools, and SIEM visualizations. First, you’ll uncover unauthorized code changes and suspicious outbound activity, from compromised Lambda functions, by analyzing CloudTrail and VPC Flow Logs. Next, you’ll detect privilege escalation attempts by spotting abnormal IAM API usage from serverless workloads. Then, you’ll hunt for credential theft by correlating Secrets Manager access with network and function-level telemetry. Finally, you’ll identify fuzzing, injection attempts, and error-driven attacks by analyzing Lambda failure patterns and correlating them with upstream event-source anomalies. By the end of the course, you’ll be able to hunt, detect, and understand adversary activity targeting modern cloud-native workloads, equipping you to defend enterprise serverless environments with confidence.

Specialized Hunts: Threat Hunting within Cloud Functions and Microservices
Advanced
53m
Table of contents

About the author
Sean Wilkins  - Pluralsight course - Specialized Hunts: Threat Hunting within Cloud Functions and Microservices
Sean Wilkins
41 courses 4.1 author rating 100 ratings

Sean Wilkins is an accomplished networking consultant and writer for infoDispersion (www.infodispersion.com) who has been in the IT field for over 20 years working with several large enterprises.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report