Putting Hackers Breaching Your Cluster in Automatic Quarantine
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical cybersecurity presentation that addresses the inevitable nature of hacker breaches and introduces an innovative solution for automatic quarantine. Learn about the vulnerabilities present in commonly used cloud native applications and how to secure them effectively. Dive into real-world scenarios demonstrating easily exploited back doors in cluster deployments, and discover a simple yet often overlooked blueprint for enhancing cluster resistance against malicious attacks. Gain valuable insights on protecting your resources, data, and reputation by automatically isolating attackers when they breach an application in your cluster, ensuring the safety of other cluster components.
Syllabus
Putting Hackers Breaching Your Cluster In Automatic Quarantine - Ziv Nevo, IBM
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera