YoVDO

A Treasure Map of Hacking and Defending Kubernetes

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Cybersecurity Courses Network Security Courses Supply Chain Security Courses Threat Modeling Courses Container Security Courses Runtime Security Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Embark on a comprehensive journey through Kubernetes security with this 38-minute conference talk by Andrew Martin from ControlPlane. Explore threat modeling techniques for Kubernetes clusters and learn how to both attack and defend them against various adversaries. Gain insights into historical and current CVEs, misconfigurations, and advanced attack methods. Discover how to protect containers, pods, supply chains, networks, storage, policies, and organizational assets. Evaluate the use of next-generation runtimes like gVisor, firecracker, and Kata Containers. Delve into workload identity concepts and advanced runtime hardening techniques. Analyze trust boundaries in multi-tenant systems to assess and mitigate compromise risks. Navigate the complexities of advanced Kubernetes security to enhance your cluster's defenses against potential threats.

Syllabus

A Treasure Map of Hacking (and Defending) Kubernetes - Andrew Martin, ControlPlane


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity