Overview
The demonstrations in the lesson showcase the core functionality of Threatmapper across a Kubernetes cluster in the sandbox environment.
The lesson describes how a modern cloud security engineering team can use Threatmapper to run Cloud Security Engineering and Operations end-to-end.
About the course
- The Operationalizing Cloud Security with Deepfence ThreatMapper course offered at Udacity introduces concepts like Compliance Posture Scanning, Registry Scanning, Vulnerability Scanning, Secret and Local Compliance Scanning, and Secrets Scanning.
Programme Structure
Courses include:
- Operationalizing Cloud Security with Deepfence ThreatMapper
Key information
Duration
- Part-time
- 1 days
Start dates & application deadlines
Language
Delivered
Campus Location
- Mountain View, United States
Disciplines
Cyber Security View 158 other Short Courses in Cyber Security in United StatesWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
We are not aware of any English requirements for this programme.
Other requirements
General requirements
Prior to enrolling, you should have the following knowledge:
- Kubernetes
Tuition Fees
-
International Applies to you
Applies to youNon-residentsFree - Out-of-StateFree
-
Domestic
Applies to youIn-StateFree
Additional Details
- Free Course