From the Cluster to the Cloud - Lateral Movements in Kubernetes
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore lateral movement techniques in Kubernetes clusters and their potential impact on cloud workloads in this 46-minute conference talk from RSA Conference. Delve into various methods attackers employ to pivot from compromised containers within a cluster to external cloud resources. Learn about practical tools and strategies for mitigating and detecting these threats, presented by Yossi Weizman, Senior Security Researcher at Microsoft. Gain valuable insights into securing Kubernetes environments and protecting your organization's cloud infrastructure from sophisticated attacks.
Syllabus
Lateral Movements in Kubernetes
Taught by
RSA Conference
Related Courses
Windows Server 2016 Security FeaturesMicrosoft via edX Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Microsoft Professional Capstone : Cybersecurity
Microsoft via edX Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn