Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cloud Native Application Threat Modeling and Adversary Emulation - Techniques and Tools

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore cloud native application threat modeling and adversary emulation techniques in this 39-minute conference talk by Rafik Harabi from Sysdig. Learn about the importance of proactively identifying and mitigating threats in dynamically changing cloud environments. Discover various threat modeling methodologies, including data flow diagrams and attack surface analysis. Gain insights into techniques for identifying threats and selecting mitigation strategies. Examine open-source tools for visualizing threats, assessing risks, and simulating realistic attacks. Acquire a comprehensive understanding of cloud-native application security practices to enhance your organization's defensive capabilities.

Syllabus

Cloud Native Application Threat Modeling and Adversary Emulation : Techniques and... - Rafik Harabi

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Cloud Native Application Threat Modeling and Adversary Emulation - Techniques and Tools

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.