Description
In this course, you will learn :
- Using ThreatMapper, learn the fundamentals of continuous monitoring, risk detection, remediation recommendations, and compliance reporting.
- In a sandbox environment, scan workload and images for vulnerabilities, secrets, malware, hardened posture, and compliance.
- Investigate Deepfence's enterprise integrations.
Syllabus :
- Operationalize Cloud Security with Deepfence ThreatMappe