YoVDO

Hacking & Protecting Kubernetes With Teleport

Offered By: Kunal Kushwaha via YouTube

Tags

Kubernetes Security Courses Attribute-Based Access Control Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore best practices for avoiding hacks and protecting Kubernetes environments in this 23-minute episode of the Open Source Cafe. Learn about Teleport, the importance of adapting security tactics, and the differences between RBAC and Attribute-based access control. Examine a Kubernetes architecture diagram, discover how Teleport enhances visibility, and hear about the favorite features of Teleport 10. Connect with the host and access additional resources, including Teleport's website, Twitter, and GitHub.

Syllabus

Introduction
About Teleport
Why is it important to adapt these tactics
RBAC vs Attribute based access control
Kubernetes architecture diagram
How Teleport helps in visibility of things
Favourite feature of Teleport 10
Outro


Taught by

Kunal Kushwaha

Related Courses

Security Best Practices in Google Cloud
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera
Configuring and Managing Kubernetes Security
Pluralsight
Security Best Practices in Google Cloud
Pluralsight
Kubernetes Security: Cluster Hardening
Pluralsight