Putting Hackers Breaching Your Cluster in Automatic Quarantine
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a critical cybersecurity presentation that addresses the inevitable nature of hacker breaches and introduces an innovative solution for automatic quarantine. Learn about the vulnerabilities present in commonly used cloud native applications and how to secure them effectively. Dive into real-world scenarios demonstrating easily exploited back doors in cluster deployments, and discover a simple yet often overlooked blueprint for enhancing cluster resistance against malicious attacks. Gain valuable insights on protecting your resources, data, and reputation by automatically isolating attackers when they breach an application in your cluster, ensuring the safety of other cluster components.
Syllabus
Putting Hackers Breaching Your Cluster In Automatic Quarantine - Ziv Nevo, IBM
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn