YoVDO

Getting Familiar with Security Observability Using eBPF and Cilium Tetragon

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud-Native Security Courses Threat Detection Courses Network Monitoring Courses Container Security Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of Security Observability using eBPF and Cilium Tetragon in this comprehensive tutorial. Delve into the concept of S.O.R.E. (Security Observability and Runtime Enforcement) and learn how to overcome challenges in understanding and implementing effective security measures. Begin with an introduction to Cilium Tetragon and the basics of Security Observability. Examine the various layers where Tetragon can extract data and provide enforcement. Identify critical activities to monitor and learn techniques for spotting potential security threats. Participate in a detailed walkthrough of network connections and associated events. Gain valuable insights into preventing malicious activities and detecting container escapes step-by-step. By the end of this 71-minute session, acquire the knowledge and skills necessary to implement robust security observability practices in cloud-native environments.

Syllabus

Tutorial: Getting Familiar with Security Observability Using eBPF &Cilium Tetragon - Holmes & Cooley


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Building on Microsoft Sentinel Platform
Microsoft via YouTube
Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube
Container Escape in 2021
Hack In The Box Security Conference via YouTube
Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube
Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube