Skip to content

Part 6: Runtime Security

Lab Progress 0/4 completed

Monitor and respond to runtime threats using audit logging, Falco, container forensics, and immutable infrastructure patterns.

ModuleDescription
Module 6.1: Kubernetes Audit LoggingConfiguring and analyzing API server audit logs
Module 6.2: Runtime Security with FalcoDetecting anomalous container behavior in real time
Module 6.3: Container InvestigationForensic analysis of compromised containers
Module 6.4: Immutable InfrastructureRead-only filesystems and immutable deployments