Threat Stack 201: Getting started with Cloud Workload Protection

Experience a hands-on introduction to Threat Stack’s Cloud Security Platform (CSP), a modern security monitoring solution. Gain knowledge through executing terminal commands against the infrastructure, resulting in real-time visibility into cloud workloads. Additionally, rapidly deploy and enable out-of-box use cases that focus on runtime activity, data loss identification, early identification of Advanced Persistent Threats, and compliance issues.

F5 Agility Lab Prerequisites:

  • Access to supported browser (Chrome, Firefox, Safari or Edge)
  • Access to UDF Deployment – Threat Stack Labs (Optional)
  • Working knowledge of basic Linux commands
  • Credential/Authentication access through SSH to a remote host with root/admin permissions for Linux
  • Administrator permissions/rights and ability to Remote Desktop Protocol (RDP) to a Windows Server

Click next to begin your lab