YoVDO

Hacking & Protecting Kubernetes With Teleport

Offered By: Kunal Kushwaha via YouTube

Tags

Kubernetes Security Courses Attribute-Based Access Control Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore best practices for avoiding hacks and protecting Kubernetes environments in this 23-minute episode of the Open Source Cafe. Learn about Teleport, the importance of adapting security tactics, and the differences between RBAC and Attribute-based access control. Examine a Kubernetes architecture diagram, discover how Teleport enhances visibility, and hear about the favorite features of Teleport 10. Connect with the host and access additional resources, including Teleport's website, Twitter, and GitHub.

Syllabus

Introduction
About Teleport
Why is it important to adapt these tactics
RBAC vs Attribute based access control
Kubernetes architecture diagram
How Teleport helps in visibility of things
Favourite feature of Teleport 10
Outro


Taught by

Kunal Kushwaha

Related Courses

Access Controls
(ISC)² via Coursera
Deep Dive with Security: AWS Identity and Access Management (IAM) (German)
Amazon Web Services via AWS Skill Builder
Deep Dive with Security: AWS Identity and Access Management (IAM) (Korean)
Amazon Web Services via AWS Skill Builder
Deep Dive with Security: AWS Identity and Access Management (IAM) (Spanish)
Amazon Web Services via AWS Skill Builder
Deep Dive with Security: AWS Identity and Access Management (IAM) (Portuguese)
Amazon Web Services via AWS Skill Builder