From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the evolution of cryptojacking techniques in cloud-native environments and learn effective strategies to protect against these threats in this informative conference talk. Delve into the world of cryptomining and its malicious counterpart, cryptojacking, as the speaker examines how attackers have shifted their focus from unpatched servers and browsers to cloud-native platforms, including containers, Kubernetes, CI/CD, and SCM systems. Gain insights into key concepts, attack techniques, and exploits used by threat actors, as well as the challenges they face and overcome to maximize their gains and conceal their activities. Discover proactive protection measures using open-source tools and approaches, ranging from static analysis to runtime protection, to strengthen your cloud-native security posture and mitigate the risks associated with cryptojacking attacks.
Syllabus
From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Introduction to Cloud Infrastructure TechnologiesLinux Foundation via edX Scalable Microservices with Kubernetes
Google via Udacity Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Introduction to Kubernetes
Linux Foundation via edX Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX