Threat Stack Labs Source | Edit on
Threat Stack 201: Getting started with Cloud Workload Protection¶
Experience a hands-on introduction to Threat Stack’s Cloud Security Platform (CSP), a modern security monitoring solution. Gain knowledge through executing terminal commands against the infrastructure, resulting in real-time visibility into cloud workloads. Additionally, rapidly deploy and enable out-of-box use cases that focus on runtime activity, data loss identification, early identification of Advanced Persistent Threats, and compliance issues.
F5 Agility Lab Prerequisites:
- Access to supported browser (Chrome, Firefox, Safari or Edge)
- Access to UDF Deployment – Threat Stack Labs (Optional)
- Working knowledge of basic Linux commands
- Credential/Authentication access through SSH to a remote host with root/admin permissions for Linux
- Administrator permissions/rights and ability to Remote Desktop Protocol (RDP) to a Windows Server
Click next to begin your lab