YoVDO

Essential-8 Security in Practice with Kubernetes

Offered By: linux.conf.au via YouTube

Tags

linux.conf.au Courses Cloud Infrastructure Courses Kubernetes Security Courses Vulnerability Scanning Courses Helm Charts Courses Trivy Courses Cilium Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implementation of Essential-8 security mitigation requirements in a Kubernetes-orchestrated cloud infrastructure for the Digital Earth Australia and Digital Earth Africa programs. Learn how to balance security needs with open access, open data, and open source principles while managing petabyte-scale data processing and cross-continent data movement. Discover the challenges of enabling scientific experimentation through arbitrary code execution and handling large-scale computational demands. Gain insights into infrastructure codification, application deployment, security scanning, network filtering, and automated GitOps deployments. Understand how to address security incidents, such as cryptocurrency mining, and implement mitigation strategies. Acquire knowledge on meeting government security practices while maintaining a flexible, on-demand computation environment for scientific users in this 44-minute conference talk from linux.conf.au 2021.

Syllabus

"Essential-8 Security in Practice with Kubernetes" - Tishampati Dhar (LCA 2021 Online)


Taught by

linux.conf.au

Related Courses

Datadog: Getting started with the Helm Chart
Google via Google Cloud Skills Boost
Getting Started with Datadog on Google Cloud
Google via Google Cloud Skills Boost
Kubernetes: Package Management with Helm
LinkedIn Learning
Develop and deploy applications on Kubernetes
Microsoft via Microsoft Learn
Introduction to Kubernetes on Azure
Microsoft via Microsoft Learn