Threat Stack 201: Getting started with Cloud Workload Protection ================================================================ Experience a hands-on introduction to Threat Stack's Cloud Security Platform (CSP), a modern security monitoring solution. Gain knowledge through executing terminal commands against the infrastructure, resulting in real-time visibility into cloud workloads. Additionally, rapidly deploy and enable out-of-box use cases that focus on runtime activity, data loss identification, early identification of Advanced Persistent Threats, and compliance issues. **F5 Agility Lab Prerequisites**: * Access to supported browser (Chrome, Firefox, Safari or Edge) * Access to **UDF Deployment – Threat Stack Labs** (Optional) * Working knowledge of basic Linux commands * Credential/Authentication access through SSH to a remote host with root/admin permissions for Linux * Administrator permissions/rights and ability to Remote Desktop Protocol (RDP) to a Windows Server .. toctree:: Threat_Stack_Cloud_Security_Platform.rst Threat_Stack_Linux_Agent.rst Threat_Stack_Agent_Windows.rst Threat_Stack_Agent_Container.rst Threat_Stack_Playbooks.rst Click next to begin your lab