Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CNCF [Cloud Native Computing Foundation]

The Art of Hiding Yourself

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the techniques hackers use to remain anonymous after compromising a Kubernetes cluster in this 25-minute conference talk by Lorenzo Fontana from Sysdig. Delve into the second phase of a cyberattack, focusing on how malicious actors conceal their presence and activities. Learn about various hiding methods, including tampering with audit logs, evading deep packet inspection, concealing processes and containers, exploiting unconventional file storage locations, and masking network connections. Gain insights into the broader picture of post-compromise stealth tactics employed by cybercriminals in Kubernetes environments, enhancing your understanding of cluster security challenges and potential countermeasures.

Syllabus

The Art of Hiding Yourself - Lorenzo Fontana, Sysdig

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of The Art of Hiding Yourself

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.