Implementing Monitoring, Logging, And Runtime Security In Kubernetes
Released 3/2026
By Elton Stoneman
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 52m 21s | Size: 150 MB
A red team exercise can expose gaps in your Kubernetes security posture that would be invisible until a real attack occurs.What you'll learn
A red team exercise can expose gaps in your Kubernetes security posture that would be invisible until a real attack occurs. In this course, Implementing Monitoring, Logging, and Runtime Security in Kubernetes, you'll learn to build the detection, response, and prevention capabilities that complete your defense-in-depth strategy. First, you'll explore implementing API audit logging with OpenTelemetry integration, creating pattern-based alerting rules to detect suspicious activity. Next, you'll discover how to deploy kernel-level runtime security using Falco to detect container escapes, unauthorized shell access, and suspicious system calls in real-time. Finally, you'll learn how to enforce container immutability through Pod Security Admission and Kyverno policies for image verification and security profile automation. When you're finished with this course, you'll have the skills and knowledge to detect threats as they happen and prevent attacks from succeeding even when other defenses fail.
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!