YoVDO

Macro Security for Your Microservices

Offered By: linux.conf.au via YouTube

Tags

linux.conf.au Courses Kubernetes Courses OpenShift Courses Istio Courses Observability Courses Service Mesh Courses Microservices Security Courses Distributed Tracing Courses Mutual TLS Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore microservices security challenges and solutions in this hands-on tutorial from linux.conf.au 2020. Learn about Istio's architecture for addressing security needs in distributed systems, including traffic encryption, access control, and auditing. Gain practical experience with custom policy enforcement, service traffic encryption using mutual TLS, and mitigating threats against data, endpoints, and communications. Suitable for those with intermediate understanding of container technology and microservices architecture. Bring a device with a modern browser to access cloud-based labs and discover how to implement robust security measures for your microservices deployments.

Syllabus

Introduction
Microservices benefits challenges
Distributed architecture
Example application
Microservices based architecture
Traditional approaches
Microservices architecture
Container assertion
Service Mesh
Capabilities
Kubernetes Terminology
Sidecar
Firewall
Control Plane
Respect to Connect
Security
observability
sto
teo
Lab
Workshop Overview
Key Ally
Openshift
Cube CDN
CubeCTL
Generating Loads
namespace
ID
Proxy Sidecar
Distributed Tracing
Certificate Acceptance
Lab Environment
Service Mesh Routing
Recommendation Routing
Most important thing


Taught by

linux.conf.au

Related Courses

Hybrid Cloud Infrastructure Foundations with Anthos
Google Cloud via Coursera
Hybrid Cloud Service Mesh with Anthos
Google Cloud via Coursera
Architecting Hybrid Cloud Infrastructure with Anthos
Google Cloud via Coursera
Introduction to Containers, Kubernetes and OpenShift
IBM via edX
Managing Apps on Kubernetes with Istio
Pluralsight