YoVDO

Fileless Attack - Detecting the Undetectable

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cybersecurity Courses Encryption Courses Linux Security Courses Malware Detection Courses Container Security Courses Cloud-Native Security Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of fileless attacks and their detection in this informative conference talk. Delve into the world of advanced cybersecurity threats as Carolina Valencia from Aqua Security breaks down the concept of fileless attacks, their growing prevalence in Linux and container environments, and effective detection methods. Learn how these stealthy attacks operate by loading malware directly into memory, evading common defenses and static scanning. Discover the use of compression and encryption techniques employed by attackers to cloak malicious files. Through a practical demonstration, gain insights into creating a fileless attack and detecting unexpected activity using eBPF tools in the Cloud Native Security Runtime Space, including Falco, Tracee, and Tetragon. Enhance your understanding of cutting-edge security challenges and solutions in the rapidly evolving landscape of cloud-native technologies.

Syllabus

Fileless Attack - Detecting the Undetectable - Carolina Valencia, Aqua Security


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
The Complete Cyber Security Course : End Point Protection!
Udemy
Máster en Seguridad Informática. Curso completo de Hacking.
Udemy
Network Analysis with Arkime
Pluralsight
Configuring Firepower Threat Defense (FTD) Integrations
Pluralsight