YoVDO

Adopting Network Policies in Highly Secure Environments

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Grafana Courses Observability Courses Cilium Courses Hubble Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of Cilium Network Policies and application-aware, Identity-based Security in this 33-minute conference talk. Learn to compare default-allow and default-deny policies, adopting a risk-based approach to secure sensitive workloads. Discover various exposure types and strategies for workload security. Gain insights into using observability tools like Cilium, Hubble, and Grafana to visualize ingress and egress connections and configure Network Policies. Understand how Network Policy Guardrails enable self-service management while maintaining control. Acquire the knowledge to effectively secure networks in highly sensitive environments, focusing on Kubernetes networking and distributed computing security.

Syllabus

Adopting Network Policies in Highly Secure Environments - Raymond de Jong, Isovalent


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Introduction to Cilium
Linux Foundation via edX
Observing Kubernetes Networking with Cilium, Hubble, and Grafana
CNCF [Cloud Native Computing Foundation] via YouTube
Cilium Workshop - Deploying and Securing Container Networks with eBPF
Linux Foundation via YouTube
Effortless Open Source Observability with Cilium, Prometheus and Grafana
CNCF [Cloud Native Computing Foundation] via YouTube
Exploring the World of Cilium: A Hands-on Workshop on Cilium, Tetragon and eBPF
Platform Engineering via YouTube