YoVDO

Essential-8 Security in Practice with Kubernetes

Offered By: linux.conf.au via YouTube

Tags

linux.conf.au Courses Cloud Infrastructure Courses Kubernetes Security Courses Vulnerability Scanning Courses Helm Charts Courses Trivy Courses Cilium Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implementation of Essential-8 security mitigation requirements in a Kubernetes-orchestrated cloud infrastructure for the Digital Earth Australia and Digital Earth Africa programs. Learn how to balance security needs with open access, open data, and open source principles while managing petabyte-scale data processing and cross-continent data movement. Discover the challenges of enabling scientific experimentation through arbitrary code execution and handling large-scale computational demands. Gain insights into infrastructure codification, application deployment, security scanning, network filtering, and automated GitOps deployments. Understand how to address security incidents, such as cryptocurrency mining, and implement mitigation strategies. Acquire knowledge on meeting government security practices while maintaining a flexible, on-demand computation environment for scientific users in this 44-minute conference talk from linux.conf.au 2021.

Syllabus

"Essential-8 Security in Practice with Kubernetes" - Tishampati Dhar (LCA 2021 Online)


Taught by

linux.conf.au

Related Courses

Container Image Security- What It Is and How to Remediate Vulnerabilities
Mirantis via YouTube
Open Source Security Scanner - Docker Image Analysis with Trivy
Linode via YouTube
Hands-on Introduction to Trivy - Continuous Scanning for Container Security
Rawkode Academy via YouTube
Improve Vulnerability Management with OCI Artifacts - It Is That Easy
CNCF [Cloud Native Computing Foundation] via YouTube
GitOps - The Magic Key to Cloud Native Security
CNCF [Cloud Native Computing Foundation] via YouTube