Unable to find what you're searching for?
We're here to help you find itDetecting Cloud Runtime Threats with Falco (LFS254) Course Overview
Explore Falco’s basics, history, design, and its role in cloud security. Dive into its architecture, threat detection methods, setup, rule customization, and output management.
Purchase This Course
USD
View Fees Breakdown
Flexi Video | 16,449 |
Official E-coursebook | |
Exam Voucher (optional) | |
Hands-On-Labs2 | 4,159 |
+ GST 18% | 4,259 |
Total Fees (without exam & Labs) |
22,359 (INR) |
Total Fees (with exam & Labs) |
28,359 (INR) |
♱ Excluding VAT/GST
You can request classroom training in any city on any date by Requesting More Information
♱ Excluding VAT/GST
You can request classroom training in any city on any date by Requesting More Information
Prerequisites for the Detecting Cloud Runtime Threats with Falco (LFS254) course:
These foundational knowledge areas will help you maximize the benefits of the course and successfully grasp the concepts covered. No advanced expertise is required, making it accessible for IT professionals aiming to enhance their skills in cloud native security.
Detecting Cloud Runtime Threats with Falco (LFS254) is a 3-day course designed to teach participants how to secure cloud-native environments using Falco, with prerequisites in cloud computing, security, system calls, and Kubernetes.
Introduction
The "Detecting Cloud Runtime Threats with Falco (LFS254)" course teaches students how to install and use Falco to secure cloud-native environments. The course covers essential aspects such as system calls, Kubernetes, and customizing Falco rules.
Learning Objectives and Outcomes
Understand the fundamentals of Falco and its role in cloud-native security.
Install and configure Falco on cloud-native environments.
Gain proficiency in using syscall data sources for host security.
Explore other data sources pertinent to cloud security.
Learn to define conditions and fields in Falco for threat detection.
Develop skills in writing and customizing Falco rules tailored to specific security needs.
Understand the output mechanisms of Falco and how to integrate with Falcosidekick.
Configure Falco according to security requirements and environmental specifics.
Learn best practices for integrating Falco with Kubernetes environments.