YoVDO

From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cryptojacking Courses Cybersecurity Courses Kubernetes Courses Cloud Security Courses Static Analysis Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of cryptojacking techniques in cloud-native environments and learn effective strategies to protect against these threats in this informative conference talk. Delve into the world of cryptomining and its malicious counterpart, cryptojacking, as the speaker examines how attackers have shifted their focus from unpatched servers and browsers to cloud-native platforms, including containers, Kubernetes, CI/CD, and SCM systems. Gain insights into key concepts, attack techniques, and exploits used by threat actors, as well as the challenges they face and overcome to maximize their gains and conceal their activities. Discover proactive protection measures using open-source tools and approaches, ranging from static analysis to runtime protection, to strengthen your cloud-native security posture and mitigate the risks associated with cryptojacking attacks.

Syllabus

From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network