Главная
Study mode:
on
1
Introduction
2
Cloud Native Application Deployment
3
Application Stack
4
Threat Vectors
5
Cloud Native Layers
6
Application Lifecycle
7
Distribute
8
Deploy
9
Runtime
10
Securing the Compute Layer
11
Securing the Containers
12
Additional Security Considerations
13
Summary
14
QA
Description:
Explore a layered approach to cloud native security in this 48-minute webinar sponsored by Palo Alto Networks. Delve into the complex process of securing cloud native applications by examining the security needs of each layer. Learn about cloud native application deployment, application stack, threat vectors, and cloud native layers. Understand the application lifecycle, including distribution, deployment, and runtime. Discover techniques for securing the compute layer and containers, and explore additional security considerations. Benefit from the expertise of Vinay Venkataraghavan, Technical Director at the Office of the CTO, Palo Alto Networks, as he guides you through this comprehensive overview of cloud security. Conclude with a summary and Q&A session to reinforce your understanding of cloud native security.

Cloud Native Security Exposed: A Layered Approach to Cloud Security

Linux Foundation
Add to list
0:00 / 0:00