This course aims to teach learners about the importance of sandboxing as a defense mechanism for running potentially risky software within organizational infrastructures. The course covers the evolution of sandbox technologies, the variety of virtualization techniques available, and how to select the most suitable sandboxing methods for isolating workloads effectively. The skills taught include understanding sandboxing concepts, evaluating different sandboxing techniques, and making informed decisions on implementing sandbox defenses. The teaching method involves a 20-minute session led by the instructor. This course is intended for individuals interested in cybersecurity, software development, and system administration.
Overview
Syllabus
Introduction
Performance
Developer Experiences
Security
Memory Allocation
Taught by
USENIX Enigma Conference