Tetragon: eBPF-Based Security Observability and Runtime Enforcement Tool
Offered By: DevConf via YouTube
Course Description
Overview
Explore the powerful Cilium Tetragon component for real-time, eBPF-based security observability and runtime enforcement in this 36-minute conference talk from DevConf.CZ 2024. Gain insights into Tetragon's overall design, configuration options, and practical usage examples. Learn how this highly configurable tool enables observation of various Linux operating system components and enforcement of security policies. Discover the potential of Tetragon to enhance your system's security and monitoring capabilities through this informative presentation by speaker Jiri Olsa.
Syllabus
Tetragon observability and security tool - DevConf.CZ 2024
Taught by
DevConf
Related Courses
Secure Networked System with Firewall and IDSUniversity of Colorado System via Coursera Introduction to Cyber Security
Uttarakhand Open University, Haldwani via Swayam Preparing for the Google Cloud Professional Data Engineer Exam 日本語版
Google Cloud via Coursera Jump Start: Maestro Hyperscale Network Security
Checkpoint via edX Information Security - Introduction to Information Security
New York University (NYU) via edX