YoVDO

What is eBPF and Why Should You Care?

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Kernel Exploitation Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the revolutionary eBPF technology in this 45-minute conference talk from 44CON 2022. Dive into the fundamentals of eBPF, its origins in the Linux kernel, and its ability to run sandboxed programs safely within the operating system kernel. Learn how to get started with eBPF, overcome common challenges, and leverage tools like Sysmon For Linux and Cilium/Tetragon for enhanced system observability. Discover various use cases for eBPF, from blue team security monitoring to custom program tracing, kernel vulnerability exploitation, and performance issue detection. Gain insights from Kev Sheldrake, an experienced security software engineer, as he shares his expertise on this exciting technology that's revolutionizing kernel-level programming and system analysis.

Syllabus

Kev Sheldrake - What is eBPF and why should you care?


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube