This intensive 24-hour course is designed to teach investigators techniques needed to respond to an investigation of a Google Cloud organization. The fast-paced course is built upon a series of hands-on labs that highlight how to investigate and respond to a targeted attack in a Google Cloud organization. Examples of skills taught include how to identify evidence of a threat actor using Google Cloud native tools, use open source utilities to enhance the investigators’ capabilities, and provide effective containment and eradication of a threat actor.
The course includes detailed discussions about methods of evidence collection and their limitations as well as how threat actors move around in the Google Cloud organization. This information is then reinforced through a dynamic hands-on lab environment powered by Google Cloud Skills Boost. The labs will have recent evidence of compromise and provide each student with their own lab environment.
After completing this course, participants should be able to:
This class is designed for beginner/intermediate-level students who have a responsibility to respond to or alert on security incidents in Google Cloud. Participants should have a basic understanding of Windows and Linux operating systems along with a basic understanding of Google Cloud or cloud concepts.
In-classroom or virtual instructor-led training
Participants will need a laptop with the latest browser of choice and the ability to connect to the internet.
Participants will receive course materials before the start of the course. Instructions for connecting to the lab environment will be given as part of the course delivery.