Essential-8 Security in Practice with Kubernetes
Offered By: linux.conf.au via YouTube
Course Description
Overview
Explore the implementation of Essential-8 security mitigation requirements in a Kubernetes-orchestrated cloud infrastructure for the Digital Earth Australia and Digital Earth Africa programs. Learn how to balance security needs with open access, open data, and open source principles while managing petabyte-scale data processing and cross-continent data movement. Discover the challenges of enabling scientific experimentation through arbitrary code execution and handling large-scale computational demands. Gain insights into infrastructure codification, application deployment, security scanning, network filtering, and automated GitOps deployments. Understand how to address security incidents, such as cryptocurrency mining, and implement mitigation strategies. Acquire knowledge on meeting government security practices while maintaining a flexible, on-demand computation environment for scientific users in this 44-minute conference talk from linux.conf.au 2021.
Syllabus
"Essential-8 Security in Practice with Kubernetes" - Tishampati Dhar (LCA 2021 Online)
Taught by
linux.conf.au
Related Courses
Penetration Testing - Discovering VulnerabilitiesNew York University (NYU) via edX The Complete Cyber Security Course : Network Security!
Udemy Certified Ethical Hacker دورة إعداد الـ
Udemy The Ethical Hacking Starter Kit: 12 Techniques
Udemy Technical Weakness Identification with Nikto
Pluralsight