YoVDO

Tetragon: eBPF-Based Security Observability and Runtime Enforcement Tool

Offered By: DevConf via YouTube

Tags

Tetragon Courses Linux Courses Security Policies Courses eBPF Courses Cilium Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the powerful Cilium Tetragon component for real-time, eBPF-based security observability and runtime enforcement in this 36-minute conference talk from DevConf.CZ 2024. Gain insights into Tetragon's overall design, configuration options, and practical usage examples. Learn how this highly configurable tool enables observation of various Linux operating system components and enforcement of security policies. Discover the potential of Tetragon to enhance your system's security and monitoring capabilities through this informative presentation by speaker Jiri Olsa.

Syllabus

Tetragon observability and security tool - DevConf.CZ 2024


Taught by

DevConf

Related Courses

Cilium - Kernel Native Security and DDOS Mitigation for Microservices with BPF
Docker via YouTube
Introduction to Cilium
Linux Foundation via edX
Introduction to Cilium - Part 2
Rawkode Academy via YouTube
Introduction to Cilium - CNI Implementation for Kubernetes with eBPF
Rawkode Academy via YouTube
Let's Go Triple Active with Three Clouds and Cilium
Devoxx via YouTube