YoVDO

Responding to Threats in AWS Linux and Kubernetes Environments

Offered By: Linux Foundation via YouTube

Tags

Cloud Security Courses Cybersecurity Courses Amazon Web Services (AWS) Courses Kubernetes Courses Linux Courses Incident Response Courses Forensics Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore real-life attack techniques used to compromise AWS Linux and Kubernetes environments in this 34-minute Linux Foundation webinar sponsored by Cado Security. Gain insights into automating tedious aspects of in-depth investigations, including data capture and processing, to efficiently respond to cloud incidents. Learn how to overcome the challenges posed by the ephemeral nature of cloud environments and access critical data for thorough analysis. Discover strategies to achieve the necessary visibility and depth required for effective threat response in complex cloud ecosystems.

Syllabus

LF Live Webinar: Responding To Threats In AWS Linux & Kubernetes Environments


Taught by

Linux Foundation

Tags

Related Courses

Introduction to Linux
Linux Foundation via edX
操作系统原理(Operating Systems)
Peking University via Coursera
Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera
Information Security-3
Indian Institute of Technology Madras via Swayam
Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera