Completed
Function Network Flow Logs
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Defending Serverless Infrastructure in the Cloud
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Cloud Serverless Infrastructure
- 3 Puma Security: Serverless Prey
- 4 Establishing The Function Reverse Shell
- 5 Serverless Execution Environment
- 6 Default Function Execution Networking
- 7 Serverless Secrets Management Options
- 8 Serverless Secrets: Where is the Source Code?
- 9 GCP Function: Source Code Example
- 10 GCP Function: Configuration File Example
- 11 Azure Function: Environment Variable Example
- 12 Serverless Execution Role
- 13 Serverless Account Credential Storage
- 14 Azure Managed Service Identity Token
- 15 Function Credential Pivoting
- 16 Serverless Function Credential Lifetime
- 17 Function Malware Persistence Example
- 18 Serverless Function Persistence Lifetime
- 19 Function Credential Audit Logging
- 20 Function Network Integration Options
- 21 Function Network Integration Benefits
- 22 Function Network Integration Example
- 23 Function Network Access Control Rules
- 24 Function Network Flow Logs
- 25 Function Private Endpoints