YoVDO

Detecting Five Famous Exploits with Falco

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Falco Courses Cloud Security Courses Threat Detection Courses Runtime Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to detect five notorious exploits using Falco, a powerful open-source cloud-native runtime security tool. Explore real-world examples and gain practical insights into identifying and mitigating security threats in cloud environments. Discover effective strategies for enhancing your organization's security posture and protecting against common vulnerabilities in this informative 32-minute video presented by the Cloud Native Computing Foundation (CNCF).

Syllabus

Detecting Five Famous Exploits With Falco


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Bypassing Falco - Cluster Compromise Without Tripping the SOC
secwestnet via YouTube
Introduction to Falco - Cloud-Native Runtime Security
Rawkode Academy via YouTube
Overcoming CVE Shock - Adding Perspective in Vulnerability Scanning
Devoxx via YouTube
How to Secure a Kubernetes Cluster from Scratch
Devoxx via YouTube
Tools to Help You Secure Your Kubernetes Cluster
Devoxx via YouTube