YoVDO

A Checklist for Security from Container to Kubernetes - An End-to-End Overview

Offered By: Linux Foundation via YouTube

Tags

Kubernetes Courses Cybersecurity Courses DevSecOps Courses Supply Chain Security Courses Container Security Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive end-to-end overview of security measures for containers and Kubernetes in this 24-minute conference talk by Carolina Valencia from Aqua Security. Delve into the Container Security Lifecycle, Supply Chain Security, and Container Signing. Examine Kubernetes Infrastructure and its built-in security features. Learn how to discover sophisticated attacks from packet captures in Kubernetes environments. Understand potential attacks against Kubernetes and familiarize yourself with the 4C's of Cloud Native security. Gain valuable insights into securing your containerized applications and Kubernetes deployments from an industry expert.

Syllabus

Intro
Container Security Lifecycle
Supply Chain Security
Container Signing
Kubernetes Infrastructure
Kubernetes Security Features
Discovering a sophisticated attack from a packet capture (PCAP) in Kubernetes ??!
Attacks against Kubernetes
The 4C's of Cloud Native security


Taught by

Linux Foundation

Tags

Related Courses

DevOps CI/CD Pipeline: Automation from development to deployment
Universidad Anáhuac via edX
DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX
Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight
Integrating Incident Response into DevSecOps
Pluralsight
DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning