LET'S CONNECT!
Enter for a chance to win an eBook of your choice from InformIT. Fill out the form.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
Develop practical skills in detecting, monitoring, and responding to threats and attacks in Kubernetes environments.
Kubernetes Threat and Attack Detection is an essential video course for Kubernetes practitioners aiming to proactively protect their clusters against security threats. Led by expert instructor Chris Jackson, this course guides you through robust strategies for detecting, analyzing, and responding to malicious activities and potential security breaches.
Throughout the lessons, you will explore critical topics such as enforcing container immutability, leveraging Kubernetes audit logs for real-time monitoring, and employing advanced threat detection tools like Falco. Youll also learn how to use the MITRE ATT&CK framework to effectively investigate and identify signs of compromise. Each lesson provides hands-on demonstrations and actionable insights, equipping you with the practical skills necessary for maintaining secure, resilient Kubernetes infrastructures.
This course equips you with advanced techniques to confidently tackle real-world Kubernetes security challenges, enhancing your threat detection and security management capabilities.
Skill Level:
Course requirement:
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Lesson 1: Ensure Immutability of Containers at Runtime
Lesson 2: Use Kubernetes Audit Logs to Monitor Access
Lesson 3: Detect Malicious Activity, Threats, and Attacks
Lesson 4: Investigate and Identify Signs of Compromise