Responding to Threats in AWS Linux and Kubernetes Environments
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore real-life attack techniques used to compromise AWS Linux and Kubernetes environments in this 34-minute Linux Foundation webinar sponsored by Cado Security. Gain insights into automating tedious aspects of in-depth investigations, including data capture and processing, to efficiently respond to cloud incidents. Learn how to overcome the challenges posed by the ephemeral nature of cloud environments and access critical data for thorough analysis. Discover strategies to achieve the necessary visibility and depth required for effective threat response in complex cloud ecosystems.
Syllabus
LF Live Webinar: Responding To Threats In AWS Linux & Kubernetes Environments
Taught by
Linux Foundation
Tags
Related Courses
Cybersecurity FundamentalsRochester Institute of Technology via edX Cyber Security in Manufacturing
University at Buffalo via Coursera Cybersecurity
Rochester Institute of Technology via edX Cyber Incident Response
Infosec via Coursera SSCP Cert Prep: 4 Incident Response and Recovery
LinkedIn Learning