Hacking & Protecting Kubernetes With Teleport
Offered By: Kunal Kushwaha via YouTube
Course Description
Overview
Explore best practices for avoiding hacks and protecting Kubernetes environments in this 23-minute episode of the Open Source Cafe. Learn about Teleport, the importance of adapting security tactics, and the differences between RBAC and Attribute-based access control. Examine a Kubernetes architecture diagram, discover how Teleport enhances visibility, and hear about the favorite features of Teleport 10. Connect with the host and access additional resources, including Teleport's website, Twitter, and GitHub.
Syllabus
Introduction
About Teleport
Why is it important to adapt these tactics
RBAC vs Attribute based access control
Kubernetes architecture diagram
How Teleport helps in visibility of things
Favourite feature of Teleport 10
Outro
Taught by
Kunal Kushwaha
Related Courses
Security Best Practices in Google CloudGoogle Cloud via Coursera Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera Configuring and Managing Kubernetes Security
Pluralsight Security Best Practices in Google Cloud
Pluralsight Kubernetes Security: Cluster Hardening
Pluralsight