YoVDO

Detecting Crypto-Jacking in Kubernetes Workloads

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Network Security Courses Privilege Escalation Courses Falco Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore crypto-jacking detection in Kubernetes workloads through this comprehensive 57-minute Cloud Native Live conference talk. Dive into topics such as Falco, privilege escalation, suspicious networking, and package management. Learn about plugin architecture, XMRig, and custom rule creation. Gain insights on testing Falco in Kubernetes environments, understanding hidden connections, and implementing clear guard rails. Discover the developer guide, GitHub resources, and get answers to common questions about Palco usage and Falco remediation.

Syllabus

Introduction
Overview
Falco
Psrux
Chmod
Creating a privilege part
Adding suspicious networking
Launching package management
Launching Telnet
Detecting a minor
Audience question
Plugin architecture
Plugin sources
XMRig
Building your own rules
Creating the environment
Testing Falco
Summary
Clear Guard Rail
Audience Questions
Falco Remediation
Custom Rule
Developer Guide
GitHub
Questions
Why use Palco
Hidden connections
Testing Falco in Kubernetes
Final Question
Final Words


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Bypassing Falco - Cluster Compromise Without Tripping the SOC
secwestnet via YouTube
Introduction to Falco - Cloud-Native Runtime Security
Rawkode Academy via YouTube
Overcoming CVE Shock - Adding Perspective in Vulnerability Scanning
Devoxx via YouTube
How to Secure a Kubernetes Cluster from Scratch
Devoxx via YouTube
Tools to Help You Secure Your Kubernetes Cluster
Devoxx via YouTube