From the course: Kubernetes Threat and Attack Detection by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Learning objectives - Kubernetes Tutorial
From the course: Kubernetes Threat and Attack Detection by Pearson
Learning objectives
Lesson 3, Detect Malicious Activity, Threats, and Attacks. This one's all about proactive security. Identifying and responding to threats, you'll see how to leverage syscall behavioral analysis, as well as to use tools like Falco, which is a real-time security monitoring tool, to be able to detect unusual activities. We'll guide you through installing Falco, configuring it, and setting up rules for monitoring, as well as to be able to interpret FALCO outputs so that you can spot potential threats. Finally, you'll see how to configure custom rules that are tailored for your specific security requirements.
Contents
-
-
-
-
-
(Locked)
Learning objectives43s
-
(Locked)
Understanding syscall behavioral analysis12m 28s
-
(Locked)
Using Falco for threat detection7m 14s
-
(Locked)
Falco host installation14m
-
(Locked)
Falco Kubernetes installation13m 51s
-
(Locked)
Falco configuration and rules7m 42s
-
(Locked)
Falco custom rules in action19m 17s
-
(Locked)
-
-