YoVDO

Kubernetes to Cloud Attack Vectors: Demos of Cross-Environment Vulnerabilities

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Google Kubernetes Engine (GKE) Courses Cloud Security Courses Lateral Movement Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricate relationship between managed Kubernetes clusters and cloud environments in this 37-minute conference talk. Discover potential attack vectors and lateral movement paths that arise from integrating cloud-specific capabilities within managed Kubernetes services. Through live demonstrations, learn how attackers can exploit vulnerabilities to move from Kubernetes clusters to cloud resources and vice versa. Gain valuable insights into best practices for securing EKS, AKS, and GKE configurations to prevent cluster-to-cloud and cloud-to-cluster attacks. Enhance your understanding of the security implications in the evolving landscape of cloud-native technologies.

Syllabus

Kubernetes to Cloud Attack Vectors: Demos Inside - Danny Hershko Shemesh & Alon Schindel, Wiz


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Enterprise Security Fundamentals
Microsoft via edX
Red Team Ethical Hacking - Beginner
Udemy
Active Directory Pentesting With Kali Linux - Red Team
Udemy
Lateral Movement with CrackMapExec
Pluralsight
Lateral Movement with Infection Monkey
Pluralsight