Cloud Native Application Threat Modeling and Adversary Emulation - Techniques and Tools
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore cloud native application threat modeling and adversary emulation techniques in this 39-minute conference talk by Rafik Harabi from Sysdig. Learn about the importance of proactively identifying and mitigating threats in dynamically changing cloud environments. Discover various threat modeling methodologies, including data flow diagrams and attack surface analysis. Gain insights into techniques for identifying threats and selecting mitigation strategies. Examine open-source tools for visualizing threats, assessing risks, and simulating realistic attacks. Acquire a comprehensive understanding of cloud-native application security practices to enhance your organization's defensive capabilities.
Syllabus
Cloud Native Application Threat Modeling and Adversary Emulation : Techniques and... - Rafik Harabi
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera