Monitoring & Defending Infrastructure Security Attacks

Abstract

Monitoring for attacks and defending them in real-time is crucial. Crunch through all the logs from the various sources (servers, applications, firewalls etc.) to gain insights from anomalies in real time. Making the right choices from the attacks can prove to be a nightmare. Even with the solutions already available in the market. In this workshop we can see attacks happening in real time using a centralised dashboard. By collecting logs from various sources we will monitor and analyse the attacks. Using data gleaned from the logs, we can apply defensive rules against the attackers. We will be using open source technologies to build this monitoring solution.

COURSE CONTENT

The workshop at the very least will include the following hands on topics:

PREREQUISITE

PARTICIPANTS REQUIREMENTS

DURATION (12 DAY)

1 day

WHO SHOULD ATTEND

Security Engineers & Analysts, SOC Teams, IT/Network Administrators, Who interested to automate security monitoring

WHAT TO EXPECT

WHAT NOT TO EXPECT

We will be mostly doing how ELK will help to security monitoring, we don’t cover scaling ELK stack.

Date
Event
Location
Kochi, India

Workshop Highlights

Avatar
Madhu Akula
Never Ending Learner!

Madhu Akula is a security ninja, published author and cloud native security researcher with an extensive experience. Also he is an active member of the international security, devops and cloud native communities (null, DevSecOps, AllDayDevOps, etc). Hold industry certifications like OSCP (Offensive Security Certified Professional), CKA (Certified Kubernetes Administrator), etc. Madhu frequently speaks and runs training sessions at security events and conferences around the world including DEFCON (24, 26 & 27), BlackHat USA (2018 & 19), USENIX LISA 2018, O’Reilly Velocity EU 2019, Appsec EU 2018, All Day DevOps (2016, 17, 18 & 19), DevSecCon (London, Singapore, Boston), DevOpsDays India, c0c0n(2017, 18), Nullcon (2018, 19), SACON 2019, Serverless Summit, null and multiple others. His research has identified vulnerabilities in over 200+ companies and organisations including; Google, Microsoft, LinkedIn, eBay, AT&T, WordPress, NTOP and Adobe, etc and credited with multiple CVE’s, Acknowledgements and rewards. He is co-author of Security Automation with Ansible2 (ISBN-13: 978-1788394512), which is listed as a technical resource by Red Hat Ansible. Won 1st prize for building Infrastructure Security Monitoring solution at InMobi flagship hackathon among 100+ engineering teams.

Next
Previous