Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Detecting Crypto-Jacking in Kubernetes Workloads

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore crypto-jacking detection in Kubernetes workloads through this comprehensive 57-minute Cloud Native Live conference talk. Dive into topics such as Falco, privilege escalation, suspicious networking, and package management. Learn about plugin architecture, XMRig, and custom rule creation. Gain insights on testing Falco in Kubernetes environments, understanding hidden connections, and implementing clear guard rails. Discover the developer guide, GitHub resources, and get answers to common questions about Palco usage and Falco remediation.

Syllabus

Introduction
Overview
Falco
Psrux
Chmod
Creating a privilege part
Adding suspicious networking
Launching package management
Launching Telnet
Detecting a minor
Audience question
Plugin architecture
Plugin sources
XMRig
Building your own rules
Creating the environment
Testing Falco
Summary
Clear Guard Rail
Audience Questions
Falco Remediation
Custom Rule
Developer Guide
GitHub
Questions
Why use Palco
Hidden connections
Testing Falco in Kubernetes
Final Question
Final Words

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Detecting Crypto-Jacking in Kubernetes Workloads

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.