YoVDO

Putting Hackers Breaching Your Cluster in Automatic Quarantine

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cybersecurity Courses Kubernetes Courses Threat Detection Courses Vulnerability Management Courses Cluster Security Courses Container Security Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical cybersecurity presentation that addresses the inevitable nature of hacker breaches and introduces an innovative solution for automatic quarantine. Learn about the vulnerabilities present in commonly used cloud native applications and how to secure them effectively. Dive into real-world scenarios demonstrating easily exploited back doors in cluster deployments, and discover a simple yet often overlooked blueprint for enhancing cluster resistance against malicious attacks. Gain valuable insights on protecting your resources, data, and reputation by automatically isolating attackers when they breach an application in your cluster, ensuring the safety of other cluster components.

Syllabus

Putting Hackers Breaching Your Cluster In Automatic Quarantine - Ziv Nevo, IBM


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera