YoVDO

Cloud Native Application Threat Modeling and Adversary Emulation - Techniques and Tools

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud-Native Security Courses Risk Assessment Courses Application Security Courses Threat Modeling Courses Attack Surface Analysis Courses Adversary Emulation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cloud native application threat modeling and adversary emulation techniques in this 39-minute conference talk by Rafik Harabi from Sysdig. Learn about the importance of proactively identifying and mitigating threats in dynamically changing cloud environments. Discover various threat modeling methodologies, including data flow diagrams and attack surface analysis. Gain insights into techniques for identifying threats and selecting mitigation strategies. Examine open-source tools for visualizing threats, assessing risks, and simulating realistic attacks. Acquire a comprehensive understanding of cloud-native application security practices to enhance your organization's defensive capabilities.

Syllabus

Cloud Native Application Threat Modeling and Adversary Emulation : Techniques and... - Rafik Harabi


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

MITRE ATT&CK Defenderā„¢ ATT&CKĀ® Adversary Emulation
Cybrary
Adversary Emulation with Caldera - Red Team Series
Linode via YouTube
CALDERA - Automating Adversary Emulation
Black Hat via YouTube
Test or Be Tested - Adversary Emulation with Atomic Red Team
RSA Conference via YouTube
Live Adversary Simulation - Red and Blue Team Tactics
RSA Conference via YouTube