磁力链接

magnet:?xt=urn:btih:DE239986B3A59EE2B8C8A44035767F5ADADDE345
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/007. 3.6 Falco Custom Rules in Action.mp4 95.0 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/004. 3.3 Falco Host Installation.mp4 63.0 MB
  • Lesson 4 Investigate and Identify Signs of Compromise/002. 4.1 MITRE ATT&CK Framework.mp4 57.1 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/002. 3.1 Understanding Syscall Behavioral Analysis.mp4 54.5 MB
  • Lesson 4 Investigate and Identify Signs of Compromise/004. 4.3 Gathering Evidence of Compromise.mp4 54.2 MB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/003. 2.2 Define an Audit Policy.mp4 52.9 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/005. 3.4 Falco Kubernetes Installation.mp4 45.2 MB
  • Lesson 4 Investigate and Identify Signs of Compromise/005. 4.4 Practicing Kubernetes Security.mp4 43.2 MB
  • Lesson 1 Ensure Immutability of Containers at Runtime/004. 1.3 Policy Enforcement with VAP.mp4 37.8 MB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/005. 2.4 Configure Backend Log Storage.mp4 33.7 MB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/002. 2.1 Auditing in Kubernetes.mp4 28.8 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/006. 3.5 Falco Configuration and Rules.mp4 28.4 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/003. 3.2 Using Falco for Threat Detection.mp4 27.6 MB
  • Lesson 1 Ensure Immutability of Containers at Runtime/003. 1.2 Read Only Filesystem.mp4 26.1 MB
  • Lesson 1 Ensure Immutability of Containers at Runtime/002. 1.1 Understanding Immutability.mp4 24.4 MB
  • Lesson 4 Investigate and Identify Signs of Compromise/003. 4.2 Security Event Log Review.mp4 16.0 MB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/004. 2.3 Event Batching and Tuning.mp4 13.3 MB
  • Introduction/001. Kubernetes Threat and Attack Detection Introduction.mp4 9.6 MB
  • Summary/001. Kubernetes Threat and Attack Detection Summary.mp4 9.1 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.mp4 5.0 MB
  • Lesson 4 Investigate and Identify Signs of Compromise/001. Learning objectives.mp4 4.8 MB
  • Lesson 1 Ensure Immutability of Containers at Runtime/001. Learning objectives.mp4 4.6 MB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.mp4 4.0 MB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/007. 3.6 Falco Custom Rules in Action.en.srt 31.2 kB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/004. 3.3 Falco Host Installation.en.srt 23.2 kB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/005. 3.4 Falco Kubernetes Installation.en.srt 23.2 kB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/003. 2.2 Define an Audit Policy.en.srt 20.5 kB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/002. 3.1 Understanding Syscall Behavioral Analysis.en.srt 20.2 kB
  • Lesson 4 Investigate and Identify Signs of Compromise/002. 4.1 MITRE ATT&CK Framework.en.srt 19.3 kB
  • Lesson 4 Investigate and Identify Signs of Compromise/004. 4.3 Gathering Evidence of Compromise.en.srt 18.0 kB
  • Lesson 4 Investigate and Identify Signs of Compromise/005. 4.4 Practicing Kubernetes Security.en.srt 13.2 kB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/002. 2.1 Auditing in Kubernetes.en.srt 12.9 kB
  • Lesson 1 Ensure Immutability of Containers at Runtime/004. 1.3 Policy Enforcement with VAP.en.srt 12.9 kB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/006. 3.5 Falco Configuration and Rules.en.srt 12.8 kB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/005. 2.4 Configure Backend Log Storage.en.srt 12.3 kB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/003. 3.2 Using Falco for Threat Detection.en.srt 11.2 kB
  • Lesson 1 Ensure Immutability of Containers at Runtime/002. 1.1 Understanding Immutability.en.srt 10.3 kB
  • Lesson 1 Ensure Immutability of Containers at Runtime/003. 1.2 Read Only Filesystem.en.srt 8.2 kB
  • Lesson 4 Investigate and Identify Signs of Compromise/003. 4.2 Security Event Log Review.en.srt 7.5 kB
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/004. 2.3 Event Batching and Tuning.en.srt 5.0 kB
  • Summary/001. Kubernetes Threat and Attack Detection Summary.en.srt 2.0 kB
  • Introduction/001. Kubernetes Threat and Attack Detection Introduction.en.srt 2.0 kB
  • Lesson 3 Detect Malicious Activity, Threats, and Attacks/001. Learning objectives.en.srt 1.0 kB
  • Lesson 4 Investigate and Identify Signs of Compromise/001. Learning objectives.en.srt 873 Bytes
  • Lesson 1 Ensure Immutability of Containers at Runtime/001. Learning objectives.en.srt 865 Bytes
  • Lesson 2 Use Kubernetes Audit Logs to Monitor Access/001. Learning objectives.en.srt 754 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!