From the course: Kubernetes Threat and Attack Detection by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Learning objectives

Learning objectives

Lesson 3, Detect Malicious Activity, Threats, and Attacks. This one's all about proactive security. Identifying and responding to threats, you'll see how to leverage syscall behavioral analysis, as well as to use tools like Falco, which is a real-time security monitoring tool, to be able to detect unusual activities. We'll guide you through installing Falco, configuring it, and setting up rules for monitoring, as well as to be able to interpret FALCO outputs so that you can spot potential threats. Finally, you'll see how to configure custom rules that are tailored for your specific security requirements.

Contents