Overview
About the course
The demonstrations in the lesson showcase the core functionality of Threatmapper across a Kubernetes cluster in the sandbox environment. The lesson describes how a modern cloud security engineering team can use Threatmapper to run Cloud Security Engineering and Operations end-to-end.
The Operationalizing Cloud Security with Deepfence ThreatMapper course offered at Udacity introduces concepts like Compliance Posture Scanning, Registry Scanning, Vulnerability Scanning, Secret and Local Compliance Scanning, and Secrets Scanning.
Programme Structure
Courses include:
- Operationalizing Cloud Security with Deepfence ThreatMapper
Key information
Duration
- Part-time
- 1 days
Start dates & application deadlines
Language
Delivered
Disciplines
Web Technologies & Cloud Computing Cyber Security View 173 other Short Courses in Cyber Security in United StatesAcademic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
We are not aware of any English requirements for this programme.
Other requirements
General requirements
- For more information please visit the official website
Tuition Fee
-
International
249 USD/moduleTuition FeeBased on the tuition of 249 USD per module during 1 days. -
National
249 USD/moduleTuition FeeBased on the tuition of 249 USD per module during 1 days. -
In-State
249 USD/moduleTuition FeeBased on the tuition of 249 USD per module during 1 days.
- Students can save 15% by paying upfront for a four-month subscription for $846.