YoVDO

Generating Security Policies with eBPF - Hands-on Walkthrough

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

eBPF Courses Kubernetes Courses System Calls Courses Security Policies Courses Container Security Courses Seccomp Courses Cloud-Native Security Courses Inspektor Gadget Courses Tetragon Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore eBPF-based solutions for detecting and enforcing security events through Security Policy creation in this 33-minute conference talk from KubeCon + CloudNativeCon Europe 2023. Gain hands-on experience with existing tools and approaches for capturing various security events and generating Security Policies. Learn about the evolution from manual filtering of system calls using seccomp and seccomp-bpf to automated solutions like Inspektor Gadget and Red Hat's seccomp profiler. Discover how Tetragon extends security event capture beyond system calls to include binaries, sockets, file operations, capabilities, and namespaces. Through a live demonstration, understand how to leverage these tools, capture different security events, and automatically generate Security Policies. Leave with a comprehensive understanding of implementing optimal eBPF-based security tooling for your system.

Syllabus

You and Your Security Profiles; Generating Security Policies with the Help of eBPF


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Scalable Microservices with Kubernetes
Google via Udacity
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Introduction to Kubernetes
Linux Foundation via edX
Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX