YoVDO

Fileless Attack - Detecting the Undetectable

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cybersecurity Courses Encryption Courses Linux Security Courses Malware Detection Courses Container Security Courses Cloud-Native Security Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of fileless attacks and their detection in this informative conference talk. Delve into the world of advanced cybersecurity threats as Carolina Valencia from Aqua Security breaks down the concept of fileless attacks, their growing prevalence in Linux and container environments, and effective detection methods. Learn how these stealthy attacks operate by loading malware directly into memory, evading common defenses and static scanning. Discover the use of compression and encryption techniques employed by attackers to cloak malicious files. Through a practical demonstration, gain insights into creating a fileless attack and detecting unexpected activity using eBPF tools in the Cloud Native Security Runtime Space, including Falco, Tracee, and Tetragon. Enhance your understanding of cutting-edge security challenges and solutions in the rapidly evolving landscape of cloud-native technologies.

Syllabus

Fileless Attack - Detecting the Undetectable - Carolina Valencia, Aqua Security


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera