Perfect Storm - Taking the Helm of Kubernetes
Offered By: YouTube
Course Description
Overview
Explore the security landscape of Kubernetes in this 43-minute conference talk from Derbycon 2018. Dive into container technology, Kubernetes architecture, and potential security vulnerabilities. Learn about attack surfaces, threat modeling, and discovery techniques specific to Kubernetes environments. Examine authentication mechanisms, container registry security, and static code analysis methods. Investigate postmount escapes and cloud security considerations. Gain valuable insights into securing Kubernetes deployments, with a comprehensive overview of key concepts and practical resources for further exploration.
Syllabus
Intro
Containers
Kubernetes
Security
Attack Service
Threat Model
Discovery
Authentication
Container Registry
Static Code Analysis
Postmount Escapes
Cloud Security
TLDR
Resources
Related Courses
Introduction to Cloud Infrastructure TechnologiesLinux Foundation via edX Scalable Microservices with Kubernetes
Google via Udacity Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Introduction to Kubernetes
Linux Foundation via edX Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX