Threat Hunting through Log Analysis in AWS
1:03:05
Attacking and Defending Cloud Native Infrastructure
53:59
How To Build a Threat Hunting Capability in AWS
28:06
Automating Log Analysis
31:22
Common misconceptions and mistakes made in Threat Hunting
31:24
AWS CloudTrail | How does CloudTrail Work? Hands on Demo
35:34
Cloud Security Monitoring and Threat Detection in AWS
56:04
Threat Hunting via DNS | SANS@MIC Talk
26:42