YoVDO

Essential-8 Security in Practice with Kubernetes

Offered By: linux.conf.au via YouTube

Tags

linux.conf.au Courses Cloud Infrastructure Courses Kubernetes Security Courses Vulnerability Scanning Courses Helm Charts Courses Trivy Courses Cilium Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implementation of Essential-8 security mitigation requirements in a Kubernetes-orchestrated cloud infrastructure for the Digital Earth Australia and Digital Earth Africa programs. Learn how to balance security needs with open access, open data, and open source principles while managing petabyte-scale data processing and cross-continent data movement. Discover the challenges of enabling scientific experimentation through arbitrary code execution and handling large-scale computational demands. Gain insights into infrastructure codification, application deployment, security scanning, network filtering, and automated GitOps deployments. Understand how to address security incidents, such as cryptocurrency mining, and implement mitigation strategies. Acquire knowledge on meeting government security practices while maintaining a flexible, on-demand computation environment for scientific users in this 44-minute conference talk from linux.conf.au 2021.

Syllabus

"Essential-8 Security in Practice with Kubernetes" - Tishampati Dhar (LCA 2021 Online)


Taught by

linux.conf.au

Related Courses

Penetration Testing - Discovering Vulnerabilities
New York University (NYU) via edX
The Complete Cyber Security Course : Network Security!
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy
The Ethical Hacking Starter Kit: 12 Techniques
Udemy
Technical Weakness Identification with Nikto
Pluralsight