A Treasure Map of Hacking and Defending Kubernetes
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Embark on a comprehensive journey through Kubernetes security with this 38-minute conference talk by Andrew Martin from ControlPlane. Explore threat modeling techniques for Kubernetes clusters and learn how to both attack and defend them against various adversaries. Gain insights into historical and current CVEs, misconfigurations, and advanced attack methods. Discover how to protect containers, pods, supply chains, networks, storage, policies, and organizational assets. Evaluate the use of next-generation runtimes like gVisor, firecracker, and Kata Containers. Delve into workload identity concepts and advanced runtime hardening techniques. Analyze trust boundaries in multi-tenant systems to assess and mitigate compromise risks. Navigate the complexities of advanced Kubernetes security to enhance your cluster's defenses against potential threats.
Syllabus
A Treasure Map of Hacking (and Defending) Kubernetes - Andrew Martin, ControlPlane
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity