YoVDO

A Checklist for Security from Container to Kubernetes - An End-to-End Overview

Offered By: Linux Foundation via YouTube

Tags

Kubernetes Courses Cybersecurity Courses DevSecOps Courses Supply Chain Security Courses Container Security Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive end-to-end overview of security measures for containers and Kubernetes in this 24-minute conference talk by Carolina Valencia from Aqua Security. Delve into the Container Security Lifecycle, Supply Chain Security, and Container Signing. Examine Kubernetes Infrastructure and its built-in security features. Learn how to discover sophisticated attacks from packet captures in Kubernetes environments. Understand potential attacks against Kubernetes and familiarize yourself with the 4C's of Cloud Native security. Gain valuable insights into securing your containerized applications and Kubernetes deployments from an industry expert.

Syllabus

Intro
Container Security Lifecycle
Supply Chain Security
Container Signing
Kubernetes Infrastructure
Kubernetes Security Features
Discovering a sophisticated attack from a packet capture (PCAP) in Kubernetes ??!
Attacks against Kubernetes
The 4C's of Cloud Native security


Taught by

Linux Foundation

Tags

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary