Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Generating Security Policies with eBPF - Hands-on Walkthrough

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore eBPF-based solutions for detecting and enforcing security events through Security Policy creation in this 33-minute conference talk from KubeCon + CloudNativeCon Europe 2023. Gain hands-on experience with existing tools and approaches for capturing various security events and generating Security Policies. Learn about the evolution from manual filtering of system calls using seccomp and seccomp-bpf to automated solutions like Inspektor Gadget and Red Hat's seccomp profiler. Discover how Tetragon extends security event capture beyond system calls to include binaries, sockets, file operations, capabilities, and namespaces. Through a live demonstration, understand how to leverage these tools, capture different security events, and automatically generate Security Policies. Leave with a comprehensive understanding of implementing optimal eBPF-based security tooling for your system.

Syllabus

You and Your Security Profiles; Generating Security Policies with the Help of eBPF

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Generating Security Policies with eBPF - Hands-on Walkthrough

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.