YoVDO

From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cryptojacking Courses Cybersecurity Courses Kubernetes Courses Cloud Security Courses Static Analysis Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of cryptojacking techniques in cloud-native environments and learn effective strategies to protect against these threats in this informative conference talk. Delve into the world of cryptomining and its malicious counterpart, cryptojacking, as the speaker examines how attackers have shifted their focus from unpatched servers and browsers to cloud-native platforms, including containers, Kubernetes, CI/CD, and SCM systems. Gain insights into key concepts, attack techniques, and exploits used by threat actors, as well as the challenges they face and overcome to maximize their gains and conceal their activities. Discover proactive protection measures using open-source tools and approaches, ranging from static analysis to runtime protection, to strengthen your cloud-native security posture and mitigate the risks associated with cryptojacking attacks.

Syllabus

From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Scalable Microservices with Kubernetes
Google via Udacity
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Introduction to Kubernetes
Linux Foundation via edX
Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX