资源详情

返回首页 | 相关搜索
Kubernetes Threat and Attack Detection
大小 704.55 MB
文件数 46
Info Hash: DE239986B3A59EE2B8C8A44035767F5ADADDE345
收录时间 2026-01-24 03:22:36
更新时间 2026-01-24 03:22:36
文件列表 (46)
Lesson 3 Detect Malicious Activity, Threats, and Attacks/007. 3.6 Falco Custom Rules in Action.mp4
90.61 MB
Introduction/001. Kubernetes Threat and Attack Detection Introduction.mp4
9.19 MB
Lesson 1 Ensure Immutability of Containers at Runtime/001. Learning objectives.en.srt
865 B
Lesson 1 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4
4.41 MB
Lesson 1 Ensure Immutability of Containers at Runtime/002. 1.1 Understanding Immutability.en.srt
10.1 KB
Lesson 1 Ensure Immutability of Containers at Runtime/002. 1.1 Understanding Immutability.mp4
23.25 MB
Lesson 1 Ensure Immutability of Containers at Runtime/003. 1.2 Read Only Filesystem.en.srt
8.04 KB
Lesson 1 Ensure Immutability of Containers at Runtime/003. 1.2 Read Only Filesystem.mp4
24.9 MB
Lesson 1 Ensure Immutability of Containers at Runtime/004. 1.3 Policy Enforcement with VAP.en.srt
12.58 KB
Lesson 1 Ensure Immutability of Containers at Runtime/004. 1.3 Policy Enforcement with VAP.mp4
36.09 MB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.en.srt
754 B
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4
3.82 MB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/002. 2.1 Auditing in Kubernetes.en.srt
12.63 KB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/002. 2.1 Auditing in Kubernetes.mp4
27.42 MB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/003. 2.2 Define an Audit Policy.en.srt
20.04 KB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/003. 2.2 Define an Audit Policy.mp4
50.47 MB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/004. 2.3 Event Batching and Tuning.en.srt
4.89 KB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/004. 2.3 Event Batching and Tuning.mp4
12.71 MB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/005. 2.4 Configure Backend Log Storage.en.srt
12.04 KB
Lesson 2 Use Kubernetes Audit Logs to Monitor Access/005. 2.4 Configure Backend Log Storage.mp4
32.09 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.en.srt
1007 B
Lesson 3 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4
4.77 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/002. 3.1 Understanding Syscall Behavioral Analysis.en.srt
19.74 KB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/002. 3.1 Understanding Syscall Behavioral Analysis.mp4
51.99 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/003. 3.2 Using Falco for Threat Detection.en.srt
10.9 KB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/003. 3.2 Using Falco for Threat Detection.mp4
26.36 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/004. 3.3 Falco Host Installation.en.srt
22.63 KB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/004. 3.3 Falco Host Installation.mp4
60.09 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/005. 3.4 Falco Kubernetes Installation.en.srt
22.62 KB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/005. 3.4 Falco Kubernetes Installation.mp4
43.15 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/006. 3.5 Falco Configuration and Rules.en.srt
12.46 KB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/006. 3.5 Falco Configuration and Rules.mp4
27.09 MB
Lesson 3 Detect Malicious Activity, Threats, and Attacks/007. 3.6 Falco Custom Rules in Action.en.srt
30.42 KB
Introduction/001. Kubernetes Threat and Attack Detection Introduction.en.srt
1.92 KB
Lesson 4 Investigate and Identify Signs of Compromise/001. Learning objectives.en.srt
873 B
Lesson 4 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4
4.61 MB
Lesson 4 Investigate and Identify Signs of Compromise/002. 4.1 MITRE ATT&CK Framework.en.srt
18.85 KB
Lesson 4 Investigate and Identify Signs of Compromise/002. 4.1 MITRE ATT&CK Framework.mp4
54.43 MB
Lesson 4 Investigate and Identify Signs of Compromise/003. 4.2 Security Event Log Review.en.srt
7.3 KB
Lesson 4 Investigate and Identify Signs of Compromise/003. 4.2 Security Event Log Review.mp4
15.21 MB
Lesson 4 Investigate and Identify Signs of Compromise/004. 4.3 Gathering Evidence of Compromise.en.srt
17.55 KB
Lesson 4 Investigate and Identify Signs of Compromise/004. 4.3 Gathering Evidence of Compromise.mp4
51.74 MB
Lesson 4 Investigate and Identify Signs of Compromise/005. 4.4 Practicing Kubernetes Security.en.srt
12.92 KB
Lesson 4 Investigate and Identify Signs of Compromise/005. 4.4 Practicing Kubernetes Security.mp4
41.21 MB
Summary/001. Kubernetes Threat and Attack Detection Summary.en.srt
1.95 KB
Summary/001. Kubernetes Threat and Attack Detection Summary.mp4
8.67 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。